oll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:39 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) [ 667.920382] FAULT_INJECTION: forcing a failure. [ 667.920382] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 667.921407] CPU: 0 UID: 0 PID: 7121 Comm: syz-executor.6 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 667.921423] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 667.921430] Call Trace: [ 667.921435] [ 667.921442] dump_stack_lvl+0xfa/0x120 [ 667.921461] should_fail_ex+0x4d7/0x5e0 [ 667.921485] _copy_from_user+0x30/0xd0 [ 667.921502] copy_mount_options+0x76/0x180 [ 667.921518] __x64_sys_mount+0x1ab/0x300 [ 667.921538] ? __pfx___x64_sys_mount+0x10/0x10 [ 667.921561] do_syscall_64+0xbf/0x360 [ 667.921574] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 667.921588] RIP: 0033:0x7ff4c1aa404a [ 667.921597] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 667.921608] RSP: 002b:00007ff4bf017fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 667.921620] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff4c1aa404a [ 667.921628] RDX: 0000000020002580 RSI: 00000000200025c0 RDI: 0000000000000000 [ 667.921635] RBP: 00007ff4bf018040 R08: 00007ff4bf018040 R09: 0000000020002580 [ 667.921643] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020002580 [ 667.921650] R13: 00000000200025c0 R14: 00007ff4bf018000 R15: 00000000200000c0 [ 667.921665] [ 667.972751] journal_path: not usable as path [ 667.973206] EXT4-fs: error: could not find journal device path 00:02:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') dup2(0xffffffffffffffff, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:02:48 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) (fail_nth: 36) 00:02:48 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:02:48 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:48 executing program 5: r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:48 executing program 1: syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) [ 677.723930] FAULT_INJECTION: forcing a failure. [ 677.723930] name fail_usercopy, interval 1, probability 0, space 0, times 0 00:02:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 677.725087] CPU: 1 UID: 0 PID: 7147 Comm: syz-executor.6 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 677.725103] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 677.725110] Call Trace: [ 677.725114] [ 677.725119] dump_stack_lvl+0xfa/0x120 [ 677.725138] should_fail_ex+0x4d7/0x5e0 [ 677.725162] _copy_from_user+0x30/0xd0 [ 677.725178] copy_mount_options+0x76/0x180 [ 677.725193] __x64_sys_mount+0x1ab/0x300 [ 677.725212] ? __pfx___x64_sys_mount+0x10/0x10 [ 677.725235] do_syscall_64+0xbf/0x360 [ 677.725249] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 677.725265] RIP: 0033:0x7ff4c1aa404a [ 677.725275] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 677.725286] RSP: 002b:00007ff4bf017fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 677.725298] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff4c1aa404a [ 677.725306] RDX: 0000000020002580 RSI: 00000000200025c0 RDI: 0000000000000000 [ 677.725313] RBP: 00007ff4bf018040 R08: 00007ff4bf018040 R09: 0000000020002580 [ 677.725320] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020002580 [ 677.725327] R13: 00000000200025c0 R14: 00007ff4bf018000 R15: 00000000200000c0 [ 677.725343] [ 677.757092] journal_path: not usable as path [ 677.757495] EXT4-fs: error: could not find journal device path 00:02:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:02:49 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) (fail_nth: 37) 00:02:49 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:49 executing program 5: r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = pidfd_open(0x0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {r1, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:49 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:49 executing program 1: syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:02:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x8000) [ 677.902467] journal_path: not usable as path [ 677.903334] EXT4-fs: error: could not find journal device path 00:02:49 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:49 executing program 1: syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:02:49 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) (fail_nth: 38) 00:02:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:02:49 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:49 executing program 5: r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = pidfd_open(0x0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {r1, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:49 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:02:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:02:49 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 678.156857] FAULT_INJECTION: forcing a failure. [ 678.156857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 678.157856] CPU: 1 UID: 0 PID: 7191 Comm: syz-executor.6 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 678.157871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 678.157879] Call Trace: [ 678.157883] [ 678.157888] dump_stack_lvl+0xfa/0x120 [ 678.157907] should_fail_ex+0x4d7/0x5e0 [ 678.157932] strncpy_from_user+0x3b/0x2f0 [ 678.157949] getname_flags.part.0+0x8d/0x540 [ 678.157967] getname_flags+0x95/0xe0 [ 678.157984] user_path_at+0x27/0x90 [ 678.158000] __x64_sys_mount+0x1e9/0x300 [ 678.158020] ? __pfx___x64_sys_mount+0x10/0x10 [ 678.158043] do_syscall_64+0xbf/0x360 [ 678.158057] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 678.158070] RIP: 0033:0x7ff4c1aa404a [ 678.158079] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 678.158090] RSP: 002b:00007ff4bf017fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 678.158102] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff4c1aa404a [ 678.158110] RDX: 0000000020002580 RSI: 00000000200025c0 RDI: 0000000000000000 [ 678.158117] RBP: 00007ff4bf018040 R08: 00007ff4bf018040 R09: 0000000020002580 [ 678.158124] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020002580 [ 678.158131] R13: 00000000200025c0 R14: 00007ff4bf018000 R15: 00000000200000c0 [ 678.158146] 00:02:57 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:57 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:57 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) (fail_nth: 39) 00:02:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:02:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = pidfd_open(0x0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {r1, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:57 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:02:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:02:57 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 686.400617] FAULT_INJECTION: forcing a failure. [ 686.400617] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 686.402514] CPU: 1 UID: 0 PID: 7224 Comm: syz-executor.6 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 686.402544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 686.402557] Call Trace: [ 686.402565] [ 686.402574] dump_stack_lvl+0xfa/0x120 [ 686.402609] should_fail_ex+0x4d7/0x5e0 [ 686.402652] strncpy_from_user+0x3b/0x2f0 [ 686.402685] getname_flags.part.0+0x8d/0x540 [ 686.402718] getname_flags+0x95/0xe0 [ 686.402751] user_path_at+0x27/0x90 [ 686.402784] __x64_sys_mount+0x1e9/0x300 [ 686.402821] ? __pfx___x64_sys_mount+0x10/0x10 [ 686.402873] do_syscall_64+0xbf/0x360 [ 686.402899] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 686.402924] RIP: 0033:0x7ff4c1aa404a [ 686.402941] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 686.402963] RSP: 002b:00007ff4bf017fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 686.402985] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff4c1aa404a [ 686.403000] RDX: 0000000020002580 RSI: 00000000200025c0 RDI: 0000000000000000 [ 686.403014] RBP: 00007ff4bf018040 R08: 00007ff4bf018040 R09: 0000000020002580 [ 686.403029] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020002580 [ 686.403043] R13: 00000000200025c0 R14: 00007ff4bf018000 R15: 00000000200000c0 [ 686.403073] 00:02:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:57 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:02:57 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x4c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xd}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:02:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = pidfd_open(0x0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {r1, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:02:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:07 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) (fail_nth: 40) 00:03:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r2, 0x0, 0x0, 0x80800) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = pidfd_open(0x0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {r1, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:07 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x4c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xd}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:07 executing program 4: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 696.796002] journal_path: not usable as path [ 696.796715] EXT4-fs: error: could not find journal device path 00:03:08 executing program 4: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:08 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) (fail_nth: 41) 00:03:08 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:08 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x4c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xd}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:08 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:08 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = pidfd_open(0x0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {r1, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 696.958213] FAULT_INJECTION: forcing a failure. [ 696.958213] name failslab, interval 1, probability 0, space 0, times 0 [ 696.959834] CPU: 0 UID: 0 PID: 7274 Comm: syz-executor.6 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 696.959860] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 696.959871] Call Trace: [ 696.959877] [ 696.959884] dump_stack_lvl+0xfa/0x120 [ 696.959910] should_fail_ex+0x4d7/0x5e0 [ 696.959946] should_failslab+0xc2/0x120 [ 696.959965] __kmalloc_cache_noprof+0x73/0x470 [ 696.959991] ? __kmalloc_cache_noprof+0x369/0x470 [ 696.960014] ? ext4_init_fs_context+0x41/0xd0 [ 696.960046] ? ext4_init_fs_context+0x41/0xd0 [ 696.960070] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 696.960091] ext4_init_fs_context+0x41/0xd0 [ 696.960115] ? __pfx_ext4_init_fs_context+0x10/0x10 [ 696.960141] alloc_fs_context+0x570/0x9e0 [ 696.960174] path_mount+0xaa3/0x1fb0 [ 696.960205] ? kmem_cache_free+0x2a1/0x460 [ 696.960232] ? __pfx_path_mount+0x10/0x10 [ 696.960259] ? getname_flags.part.0+0x1c6/0x540 [ 696.960286] ? putname.part.0+0x11b/0x160 [ 696.960310] __x64_sys_mount+0x27b/0x300 [ 696.960339] ? __pfx___x64_sys_mount+0x10/0x10 [ 696.960376] do_syscall_64+0xbf/0x360 [ 696.960397] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 696.960417] RIP: 0033:0x7ff4c1aa404a [ 696.960431] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 696.960448] RSP: 002b:00007ff4bf017fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 696.960467] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff4c1aa404a [ 696.960479] RDX: 0000000020002580 RSI: 00000000200025c0 RDI: 0000000000000000 [ 696.960490] RBP: 00007ff4bf018040 R08: 00007ff4bf018040 R09: 0000000020002580 [ 696.960502] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020002580 [ 696.960513] R13: 00000000200025c0 R14: 00007ff4bf018000 R15: 00000000200000c0 [ 696.960538] 00:03:17 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) (fail_nth: 42) 00:03:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_open(0x0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:17 executing program 4: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r1, 0x0, 0x0, 0x80800) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:17 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x4c, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xd}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:17 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 706.190874] journal_path: not usable as path [ 706.191317] EXT4-fs: error: could not find journal device path 00:03:17 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x4c, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xd}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:26 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:26 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:26 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) (fail_nth: 43) 00:03:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) [ 715.051773] journal_path: not usable as path [ 715.052239] EXT4-fs: error: could not find journal device path [ 715.056574] FAULT_INJECTION: forcing a failure. [ 715.056574] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 715.057875] CPU: 0 UID: 0 PID: 7325 Comm: syz-executor.6 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 715.057891] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 715.057899] Call Trace: [ 715.057903] [ 715.057907] dump_stack_lvl+0xfa/0x120 [ 715.057927] should_fail_ex+0x4d7/0x5e0 [ 715.057952] _copy_to_user+0x32/0xd0 [ 715.057969] simple_read_from_buffer+0xe0/0x180 [ 715.057988] proc_fail_nth_read+0x189/0x270 [ 715.058007] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 715.058025] ? security_file_permission+0x22/0x90 [ 715.058041] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 715.058058] vfs_read+0x1eb/0xbe0 [ 715.058079] ? __pfx_vfs_read+0x10/0x10 [ 715.058096] ? lock_release+0xc8/0x290 [ 715.058112] ? __fget_files+0x20d/0x3b0 [ 715.058135] ksys_read+0x121/0x240 [ 715.058151] ? __pfx_ksys_read+0x10/0x10 [ 715.058173] do_syscall_64+0xbf/0x360 [ 715.058186] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 715.058199] RIP: 0033:0x7ff4c1a5569c [ 715.058208] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 715.058219] RSP: 002b:00007ff4bf018170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 715.058231] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007ff4c1a5569c [ 715.058239] RDX: 000000000000000f RSI: 00007ff4bf0181e0 RDI: 0000000000000003 [ 715.058246] RBP: 00007ff4bf0181d0 R08: 0000000000000000 R09: 0000000020002580 [ 715.058253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 715.058260] R13: 00007ffc7b7fbfbf R14: 00007ff4bf018300 R15: 0000000000022000 [ 715.058276] 00:03:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:26 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:03:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 715.164871] journal_path: not usable as path [ 715.165309] EXT4-fs: error: could not find journal device path 00:03:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x4c, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xd}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:26 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:35 executing program 3: syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:35 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:35 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:03:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:35 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:35 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:35 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 724.343817] journal_path: not usable as path [ 724.344857] EXT4-fs: error: could not find journal device path [ 724.357288] journal_path: not usable as path [ 724.358217] EXT4-fs: error: could not find journal device path 00:03:35 executing program 3: syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:35 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:35 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:03:35 executing program 3: syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:35 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:35 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 724.583012] journal_path: not usable as path [ 724.583904] EXT4-fs: error: could not find journal device path [ 724.588685] journal_path: not usable as path [ 724.589641] EXT4-fs: error: could not find journal device path 00:03:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:46 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:03:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:46 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:46 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:46 executing program 7: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) [ 734.970078] journal_path: not usable as path [ 734.971061] EXT4-fs: error: could not find journal device path [ 734.982039] journal_path: not usable as path [ 734.982806] EXT4-fs: error: could not find journal device path 00:03:46 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = pidfd_open(0x0, 0x0) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:46 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:46 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:03:46 executing program 7: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 735.206960] journal_path: not usable as path [ 735.207395] EXT4-fs: error: could not find journal device path [ 735.245774] journal_path: not usable as path [ 735.246302] EXT4-fs: error: could not find journal device path 00:03:46 executing program 7: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:03:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = pidfd_open(0x0, 0x0) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:55 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:55 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:03:55 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:03:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) [ 744.335140] journal_path: not usable as path [ 744.336149] EXT4-fs: error: could not find journal device path 00:03:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 744.341779] journal_path: not usable as path [ 744.343169] EXT4-fs: error: could not find journal device path 00:03:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:03:55 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:03:55 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 744.507398] journal_path: not usable as path [ 744.508339] EXT4-fs: error: could not find journal device path [ 744.510720] journal_path: not usable as path [ 744.511783] EXT4-fs: error: could not find journal device path 00:04:06 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:06 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = pidfd_open(0x0, 0x0) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:04:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:04:06 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:04:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:06 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:04:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) [ 755.151567] journal_path: not usable as path [ 755.152081] EXT4-fs: error: could not find journal device path [ 755.154988] journal_path: not usable as path [ 755.155468] EXT4-fs: error: could not find journal device path 00:04:06 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:04:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:04:06 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 755.259670] journal_path: not usable as path [ 755.261051] EXT4-fs: error: could not find journal device path 00:04:06 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:04:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 755.275158] journal_path: not usable as path [ 755.276555] EXT4-fs: error: could not find journal device path 00:04:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:06 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(0x0, 0x0, 0x9) 00:04:06 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x13, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 755.430320] journal_path: not usable as path [ 755.430998] EXT4-fs: error: could not find journal device path [ 755.440609] journal_path: not usable as path [ 755.441121] EXT4-fs: error: could not find journal device path 00:04:21 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:04:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:04:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:21 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:21 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x24, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:04:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(0x0, 0x0, 0x9) 00:04:21 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 770.070318] journal_path: not usable as path [ 770.070745] EXT4-fs: error: could not find journal device path [ 770.074733] journal_path: not usable as path [ 770.075145] EXT4-fs: error: could not find journal device path 00:04:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:21 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:21 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:04:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = pidfd_open(0x0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {r1, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:04:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(0x0, 0x0, 0x9) 00:04:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:04:21 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) [ 770.223095] journal_path: not usable as path [ 770.223824] EXT4-fs: error: could not find journal device path 00:04:21 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 770.241746] journal_path: not usable as path [ 770.242633] EXT4-fs: error: could not find journal device path 00:04:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:04:31 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:04:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = pidfd_open(0x0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {r1, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:04:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:04:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:31 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 779.854899] journal_path: not usable as path [ 779.855667] EXT4-fs: error: could not find journal device path [ 779.864015] journal_path: not usable as path [ 779.864758] EXT4-fs: error: could not find journal device path 00:04:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:04:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000003}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:04:31 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:04:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = pidfd_open(0x0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0, 0x18}, {r1, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:04:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) [ 780.089213] journal_path: not usable as path [ 780.090161] EXT4-fs: error: could not find journal device path [ 780.109210] journal_path: not usable as path [ 780.109945] EXT4-fs: error: could not find journal device path 00:04:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:40 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:04:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:04:40 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:04:40 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:04:40 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 789.529908] journal_path: not usable as path [ 789.530323] EXT4-fs: error: could not find journal device path [ 789.531649] journal_path: not usable as path [ 789.532120] EXT4-fs: error: could not find journal device path 00:04:40 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:40 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x80c, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:04:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 789.643165] journal_path: not usable as path [ 789.643604] EXT4-fs: error: could not find journal device path [ 789.649043] journal_path: not usable as path [ 789.649424] EXT4-fs: error: could not find journal device path 00:04:40 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}], 0x2, 0x9) 00:04:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:40 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x90c, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:04:40 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x8000) [ 789.766765] journal_path: not usable as path [ 789.767606] EXT4-fs: error: could not find journal device path [ 789.769581] journal_path: not usable as path [ 789.770065] EXT4-fs: error: could not find journal device path 00:04:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:04:51 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}], 0x2, 0x9) 00:04:51 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:51 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xc08, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:04:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:04:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) [ 800.458246] journal_path: not usable as path [ 800.458992] EXT4-fs: error: could not find journal device path [ 800.471344] journal_path: not usable as path [ 800.472279] EXT4-fs: error: could not find journal device path 00:04:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:04:51 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:04:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) 00:05:02 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xc09, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:05:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}], 0x2, 0x9) 00:05:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:05:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 811.648955] journal_path: not usable as path [ 811.649690] EXT4-fs: error: could not find journal device path [ 811.673755] journal_path: not usable as path [ 811.674655] EXT4-fs: error: could not find journal device path 00:05:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {}], 0x3, 0x9) 00:05:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) 00:05:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:05:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:05:03 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:05:03 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:03 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 811.966715] journal_path: not usable as path [ 811.967647] EXT4-fs: error: could not find journal device path [ 811.983527] journal_path: not usable as path [ 811.984348] EXT4-fs: error: could not find journal device path 00:05:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:05:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) 00:05:13 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) 00:05:13 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:05:13 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x1300, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 821.967955] journal_path: not usable as path [ 821.968347] EXT4-fs: error: could not find journal device path [ 821.974450] journal_path: not usable as path [ 821.974813] EXT4-fs: error: could not find journal device path 00:05:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) 00:05:13 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:05:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:13 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:05:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) 00:05:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:05:13 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x8000) [ 822.113987] journal_path: not usable as path [ 822.114379] EXT4-fs: error: could not find journal device path [ 822.130256] journal_path: not usable as path [ 822.130638] EXT4-fs: error: could not find journal device path 00:05:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) 00:05:23 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:05:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:05:23 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) 00:05:23 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:23 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:05:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) 00:05:23 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 831.928790] journal_path: not usable as path [ 831.929989] EXT4-fs: error: could not find journal device path [ 831.942150] journal_path: not usable as path [ 831.943073] EXT4-fs: error: could not find journal device path 00:05:23 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:05:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:23 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {}], 0x3, 0x9) 00:05:23 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x2400, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:05:23 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, 0x0, 0x0) 00:05:23 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) [ 832.145208] journal_path: not usable as path [ 832.146019] EXT4-fs: error: could not find journal device path 00:05:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 832.161203] journal_path: not usable as path [ 832.162195] EXT4-fs: error: could not find journal device path 00:05:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {}], 0x3, 0x9) 00:05:23 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, 0x0, 0x0) 00:05:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {}], 0x3, 0x9) 00:05:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:05:34 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, 0x0, 0x0) 00:05:34 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:34 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:05:34 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:34 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 843.183591] journal_path: not usable as path [ 843.184074] EXT4-fs: error: could not find journal device path [ 843.188451] journal_path: not usable as path [ 843.189049] EXT4-fs: error: could not find journal device path 00:05:34 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:05:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) 00:05:34 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x30}}, 0x8000) [ 843.285578] journal_path: not usable as path [ 843.286097] EXT4-fs: error: could not find journal device path [ 843.296764] journal_path: not usable as path [ 843.297321] EXT4-fs: error: could not find journal device path 00:05:34 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1}, {}], 0x3, 0x9) 00:05:43 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:43 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x30}}, 0x0) 00:05:43 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xe0ffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:05:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:05:43 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) 00:05:43 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {r1}, {}], 0x3, 0x9) [ 852.358794] journal_path: not usable as path [ 852.359777] EXT4-fs: error: could not find journal device path [ 852.364671] journal_path: not usable as path [ 852.366266] EXT4-fs: error: could not find journal device path 00:05:43 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:05:43 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{r1}, {}], 0x2, 0x9) 00:05:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) 00:05:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:43 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:43 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:05:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 852.554501] journal_path: not usable as path [ 852.556065] EXT4-fs: error: could not find journal device path [ 852.571713] journal_path: not usable as path [ 852.573007] EXT4-fs: error: could not find journal device path 00:05:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) 00:05:43 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:52 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:52 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) 00:05:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) 00:05:52 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:05:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:05:52 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:05:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:05:52 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 861.680446] journal_path: not usable as path [ 861.680980] EXT4-fs: error: could not find journal device path [ 861.686554] journal_path: not usable as path [ 861.687329] EXT4-fs: error: could not find journal device path 00:05:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) 00:05:53 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:06:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) 00:06:02 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:02 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:06:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:06:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(0x0, 0x0, 0x9) 00:06:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 870.986152] journal_path: not usable as path [ 870.986635] EXT4-fs: error: could not find journal device path [ 870.990691] journal_path: not usable as path [ 870.991296] EXT4-fs: error: could not find journal device path 00:06:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:06:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:02 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:06:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:06:02 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) 00:06:02 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) [ 871.192756] journal_path: not usable as path [ 871.193352] EXT4-fs: error: could not find journal device path [ 871.203160] journal_path: not usable as path [ 871.203659] EXT4-fs: error: could not find journal device path 00:06:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:06:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:02 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{r1}, {}], 0x2, 0x0) [ 871.371160] journal_path: not usable as path [ 871.372879] EXT4-fs: error: could not find journal device path [ 871.381789] journal_path: not usable as path [ 871.384090] EXT4-fs: error: could not find journal device path 00:06:10 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:10 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_open(0x0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:06:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:06:10 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, 0x0, 0x0) 00:06:10 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r1, 0x0, 0x0, 0x80800) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:10 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:06:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:06:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{r1}, {}], 0x2, 0x0) [ 879.143172] journal_path: not usable as path [ 879.143627] EXT4-fs: error: could not find journal device path [ 879.148343] journal_path: not usable as path [ 879.148781] EXT4-fs: error: could not find journal device path 00:06:10 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 879.222376] journal_path: not usable as path [ 879.222900] EXT4-fs: error: could not find journal device path [ 879.229713] journal_path: not usable as path [ 879.230164] EXT4-fs: error: could not find journal device path 00:06:18 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x80c0000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) poll(&(0x7f0000001480)=[{r1}, {}], 0x2, 0x0) 00:06:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:06:18 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_open(0x0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:06:18 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:06:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r2, 0x0, 0x0, 0x80800) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, 0x0, 0x0) [ 887.388711] journal_path: not usable as path [ 887.389193] EXT4-fs: error: could not find journal device path [ 887.390648] journal_path: not usable as path [ 887.391128] EXT4-fs: error: could not find journal device path 00:06:18 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x90c0000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, 0x0, 0x0) [ 887.520662] journal_path: not usable as path [ 887.522122] EXT4-fs: error: could not find journal device path 00:06:18 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) [ 887.547264] journal_path: not usable as path [ 887.548281] EXT4-fs: error: could not find journal device path 00:06:18 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_open(0x0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:06:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:06:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') dup2(0xffffffffffffffff, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r2, 0x0, 0x0, 0x80800) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:18 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') dup2(0xffffffffffffffff, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r4, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:06:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:06:18 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) [ 887.775501] journal_path: not usable as path [ 887.776391] EXT4-fs: error: could not find journal device path 00:06:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_open(0x0, 0x0) 00:06:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) [ 887.805489] journal_path: not usable as path [ 887.806607] EXT4-fs: error: could not find journal device path 00:06:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:06:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) 00:06:28 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:06:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:28 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x13000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:28 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:06:28 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:06:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 897.399029] journal_path: not usable as path [ 897.399772] EXT4-fs: error: could not find journal device path [ 897.410216] journal_path: not usable as path [ 897.410947] EXT4-fs: error: could not find journal device path 00:06:28 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:06:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:28 executing program 3: clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:06:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, 0x0, 0x8000) 00:06:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) 00:06:37 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) 00:06:37 executing program 3: clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:06:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:06:37 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:06:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') dup2(0xffffffffffffffff, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:37 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, 0x0, 0x8000) [ 906.067746] journal_path: not usable as path [ 906.068639] EXT4-fs: error: could not find journal device path 00:06:37 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) [ 906.096982] journal_path: not usable as path [ 906.098084] EXT4-fs: error: could not find journal device path 00:06:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) 00:06:47 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:06:47 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:47 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:47 executing program 3: clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:06:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') dup2(0xffffffffffffffff, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) 00:06:47 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, 0x0, 0x8000) [ 915.941779] journal_path: not usable as path [ 915.942756] EXT4-fs: error: could not find journal device path [ 915.954726] journal_path: not usable as path [ 915.955644] EXT4-fs: error: could not find journal device path 00:06:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:06:47 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:06:47 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) 00:06:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) 00:06:47 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x24000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}], 0x3, 0x9) 00:06:47 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) [ 916.160110] journal_path: not usable as path [ 916.160922] EXT4-fs: error: could not find journal device path [ 916.171446] journal_path: not usable as path [ 916.172164] EXT4-fs: error: could not find journal device path 00:06:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:06:47 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:06:47 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 916.425293] journal_path: not usable as path [ 916.426263] EXT4-fs: error: could not find journal device path [ 916.432031] journal_path: not usable as path [ 916.432756] EXT4-fs: error: could not find journal device path 00:06:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}], 0x3, 0x9) 00:06:57 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:57 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:06:57 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:06:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:06:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) 00:06:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 926.474800] journal_path: not usable as path [ 926.475245] EXT4-fs: error: could not find journal device path [ 926.478721] journal_path: not usable as path [ 926.479127] EXT4-fs: error: could not find journal device path 00:06:57 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:06:57 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:06:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:06:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}], 0x2, 0x9) [ 926.596326] journal_path: not usable as path [ 926.597239] EXT4-fs: error: could not find journal device path 00:06:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x8000) [ 926.638283] journal_path: not usable as path [ 926.639175] EXT4-fs: error: could not find journal device path 00:07:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:07:07 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:07 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xffffe000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:07:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) 00:07:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:07:07 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) dup2(r3, r2) 00:07:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) dup2(r3, r2) 00:07:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}], 0x2, 0x9) 00:07:07 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x8000) [ 936.384708] journal_path: not usable as path [ 936.385181] EXT4-fs: error: could not find journal device path [ 936.400013] journal_path: not usable as path [ 936.400439] EXT4-fs: error: could not find journal device path 00:07:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:07:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:07:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}], 0x2, 0x9) 00:07:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="32120000000000000001000740000000070e000104ff00000000000000ff000000000000000104000000000000860000000000000000000000000000000900000000000000f8ffffffffffffff0001000740000000020e0902008100000000000000ff070000000000004d050000000000000300000000000000010000000000000003000000007c14509b2f8d400000000800000000000000010400000000ba22ce4d661fde17c3694c7bb43513a7514daad14a5f67c5e4b2b585ffa290af55782914b85608cf90e26774ea3ddd10176e97c2dd675d9b309bbf117bd82d941211ce0acadd2143fac9d6e024b0ab19ed2f9b01faa9764dd4aa68bc4e7d454cf56b1402885eef37a507a8de6dc7dfd8826dda625d8ea7ac7cfb3abb5196115189c928016c58957b794e6729425a4154333c8d5d7f486d5f99bcc37c49047ddd15ef496cf0a0d692e49766d51465"], 0x98) dup2(r3, r2) 00:07:07 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:07 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:07:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) 00:07:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:07:07 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}], 0x2, 0x9) 00:07:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) [ 936.541443] journal_path: not usable as path [ 936.541887] EXT4-fs: error: could not find journal device path [ 936.549556] journal_path: not usable as path [ 936.549992] EXT4-fs: error: could not find journal device path 00:07:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:07:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:07:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:07:17 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) 00:07:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) 00:07:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:07:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') 00:07:17 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 946.252463] journal_path: not usable as path [ 946.253530] EXT4-fs: error: could not find journal device path [ 946.272326] journal_path: not usable as path [ 946.273128] EXT4-fs: error: could not find journal device path 00:07:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:07:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:07:17 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:07:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:07:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') 00:07:17 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:07:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 946.479564] journal_path: not usable as path [ 946.480032] EXT4-fs: error: could not find journal device path [ 946.482381] journal_path: not usable as path [ 946.482773] EXT4-fs: error: could not find journal device path 00:07:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) 00:07:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2}], 0x3, 0x9) 00:07:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:07:26 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:07:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) 00:07:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:26 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') 00:07:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) [ 955.526447] journal_path: not usable as path [ 955.527355] EXT4-fs: error: could not find journal device path [ 955.540384] journal_path: not usable as path [ 955.541324] EXT4-fs: error: could not find journal device path 00:07:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:07:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:07:26 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:07:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) 00:07:26 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:07:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2}], 0x3, 0x9) 00:07:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:07:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) [ 955.739935] journal_path: not usable as path [ 955.740359] EXT4-fs: error: could not find journal device path [ 955.760007] journal_path: not usable as path [ 955.760394] EXT4-fs: error: could not find journal device path 00:07:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:07:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:07:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2}], 0x3, 0x9) 00:07:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1}], 0x2, 0x9) 00:07:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:07:36 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:07:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) 00:07:36 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 965.088681] journal_path: not usable as path [ 965.089332] EXT4-fs: error: could not find journal device path 00:07:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) [ 965.123087] journal_path: not usable as path [ 965.123486] EXT4-fs: error: could not find journal device path 00:07:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:07:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1}], 0x2, 0x9) 00:07:36 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:07:45 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:45 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r4, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:07:45 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:07:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:07:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:07:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:07:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1}], 0x2, 0x9) [ 974.729728] journal_path: not usable as path [ 974.730194] EXT4-fs: error: could not find journal device path [ 974.739575] journal_path: not usable as path [ 974.740126] EXT4-fs: error: could not find journal device path 00:07:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:07:45 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r3, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:07:46 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:07:46 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:07:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r1}], 0x3, 0x9) 00:07:46 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r4, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:07:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:07:46 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r4, 0x8}, {r3, 0x8000}], 0x4, 0x9) [ 974.928750] journal_path: not usable as path [ 974.929466] EXT4-fs: error: could not find journal device path [ 974.939488] journal_path: not usable as path [ 974.940171] EXT4-fs: error: could not find journal device path 00:07:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r3, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:07:46 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:07:46 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r1}], 0x3, 0x9) 00:07:46 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r3, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:07:56 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:07:56 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) 00:07:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r1}], 0x3, 0x9) 00:07:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) 00:07:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') 00:07:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:07:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:07:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 984.842209] journal_path: not usable as path [ 984.843141] EXT4-fs: error: could not find journal device path [ 984.859900] journal_path: not usable as path [ 984.860960] EXT4-fs: error: could not find journal device path 00:08:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) 00:08:05 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) 00:08:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1}, {r2}], 0x3, 0x9) 00:08:05 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:08:05 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) 00:08:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:08:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:05 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 993.857387] journal_path: not usable as path [ 993.857834] EXT4-fs: error: could not find journal device path [ 993.858795] journal_path: not usable as path [ 993.859328] EXT4-fs: error: could not find journal device path 00:08:05 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:08:05 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 993.933750] journal_path: not usable as path [ 993.934341] EXT4-fs: error: could not find journal device path [ 993.941649] journal_path: not usable as path [ 993.942050] EXT4-fs: error: could not find journal device path 00:08:05 executing program 5: r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:08:05 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:08:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:08:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:05 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) 00:08:05 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) 00:08:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 994.079520] journal_path: not usable as path [ 994.080349] EXT4-fs: error: could not find journal device path [ 994.110633] journal_path: not usable as path [ 994.111674] EXT4-fs: error: could not find journal device path 00:08:15 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:08:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) 00:08:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:15 executing program 5: r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1}], 0x2, 0x9) 00:08:15 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:08:15 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) 00:08:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) 00:08:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1004.298404] journal_path: not usable as path [ 1004.298951] EXT4-fs: error: could not find journal device path [ 1004.308967] journal_path: not usable as path [ 1004.309434] EXT4-fs: error: could not find journal device path 00:08:15 executing program 5: r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1}], 0x2, 0x9) 00:08:15 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x80c000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:08:15 executing program 2: r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:15 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) 00:08:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) dup2(r3, r2) 00:08:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:08:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1004.532684] journal_path: not usable as path [ 1004.533269] EXT4-fs: error: could not find journal device path [ 1004.536621] journal_path: not usable as path [ 1004.537289] EXT4-fs: error: could not find journal device path 00:08:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1}], 0x2, 0x9) 00:08:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:08:24 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) dup2(r3, r2) 00:08:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) dup2(r3, r2) 00:08:24 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) 00:08:24 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x90c000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:08:24 executing program 2: r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1013.434202] journal_path: not usable as path [ 1013.435024] EXT4-fs: error: could not find journal device path [ 1013.441277] journal_path: not usable as path [ 1013.442059] EXT4-fs: error: could not find journal device path 00:08:24 executing program 2: r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:24 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:08:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 00:08:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x0) 00:08:24 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:24 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="32120000000000000001000740000000070e000104ff00000000000000ff000000000000000104000000000000860000000000000000000000000000000900000000000000f8ffffffffffffff0001000740000000020e0902008100000000000000ff070000000000004d050000000000000300000000000000010000000000000003000000007c14509b2f8d400000000800000000000000010400000000ba22ce4d661fde17c3694c7bb43513a7514daad14a5f67c5e4b2b585ffa290af55782914b85608cf90e26774ea3ddd10176e97c2dd675d9b309bbf117bd82d941211ce0acadd2143fac9d6e024b0ab19ed2f9b01faa9764dd4aa68bc4e7d454cf56b1402885eef37a507a8de6dc7dfd8826dda625d8ea7ac7cfb3abb5196115189c928016c58957b794e6729425a4154333c8d5d7f486d5f99bcc37c49047ddd15ef496cf0a0d692e49766d51465"], 0x98) dup2(r3, r2) 00:08:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:08:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) [ 1013.650468] journal_path: not usable as path [ 1013.651355] EXT4-fs: error: could not find journal device path [ 1013.663330] journal_path: not usable as path [ 1013.664054] EXT4-fs: error: could not find journal device path 00:08:24 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x8000) 00:08:34 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x0) 00:08:34 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:08:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:08:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x98) dup2(r3, r2) 00:08:34 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') 00:08:34 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:34 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x1300000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1023.440965] journal_path: not usable as path [ 1023.441720] EXT4-fs: error: could not find journal device path [ 1023.444525] journal_path: not usable as path [ 1023.445373] EXT4-fs: error: could not find journal device path 00:08:34 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:44 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:08:44 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) 00:08:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) 00:08:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x0) 00:08:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') 00:08:44 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) [ 1033.401768] journal_path: not usable as path [ 1033.402730] EXT4-fs: error: could not find journal device path [ 1033.419668] journal_path: not usable as path [ 1033.420654] EXT4-fs: error: could not find journal device path 00:08:44 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x0) 00:08:44 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:08:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') 00:08:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) 00:08:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) 00:08:44 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:08:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:44 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1033.692369] journal_path: not usable as path [ 1033.693142] EXT4-fs: error: could not find journal device path [ 1033.703348] journal_path: not usable as path [ 1033.704063] EXT4-fs: error: could not find journal device path 00:08:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) (fail_nth: 1) 00:08:45 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x2400000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1033.816087] FAULT_INJECTION: forcing a failure. [ 1033.816087] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1033.817962] CPU: 0 UID: 0 PID: 8675 Comm: syz-executor.4 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1033.817999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1033.818012] Call Trace: [ 1033.818020] [ 1033.818028] dump_stack_lvl+0xfa/0x120 [ 1033.818057] should_fail_ex+0x4d7/0x5e0 [ 1033.818094] _copy_from_user+0x30/0xd0 [ 1033.818122] do_sys_poll+0x1b3/0xd90 [ 1033.818154] ? tracing_gen_ctx_irq_test+0x167/0x1f0 [ 1033.818193] ? trace_event_reg+0x18d/0x350 [ 1033.818218] ? __pfx_do_sys_poll+0x10/0x10 [ 1033.818246] ? perf_trace_add+0x233/0x340 [ 1033.818266] ? tracing_gen_ctx_irq_test+0x167/0x1f0 [ 1033.818299] ? perf_swevent_event+0x63/0x3f0 [ 1033.818328] ? perf_tp_event+0x807/0xe70 [ 1033.818362] ? __pfx_perf_tp_event+0x10/0x10 [ 1033.818390] ? visit_groups_merge.constprop.0.isra.0+0x6e7/0x1150 [ 1033.818424] ? tracing_gen_ctx_irq_test+0x167/0x1f0 [ 1033.818462] ? perf_tp_event+0x807/0xe70 [ 1033.818495] ? __pfx_perf_tp_event+0x10/0x10 [ 1033.818519] ? ctx_sched_in+0x134/0x9b0 [ 1033.818574] ? __lock_acquire+0xc65/0x1b70 [ 1033.818611] ? __lock_acquire+0xc65/0x1b70 [ 1033.818640] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1033.818675] ? lock_acquire+0x15e/0x2f0 [ 1033.818697] ? find_held_lock+0x2b/0x80 [ 1033.818725] ? timespec64_add_safe+0x18c/0x210 [ 1033.818756] ? __pfx_timespec64_add_safe+0x10/0x10 [ 1033.818787] ? ktime_get_ts64+0x292/0x360 [ 1033.818819] ? read_tsc+0x9/0x20 [ 1033.818843] ? ktime_get_ts64+0x216/0x360 [ 1033.818873] __x64_sys_poll+0x192/0x480 [ 1033.818903] ? __pfx___x64_sys_poll+0x10/0x10 [ 1033.818941] do_syscall_64+0xbf/0x360 [ 1033.818965] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1033.818987] RIP: 0033:0x7fc92439db19 [ 1033.819004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1033.819024] RSP: 002b:00007fc921913188 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 1033.819044] RAX: ffffffffffffffda RBX: 00007fc9244b0f60 RCX: 00007fc92439db19 00:08:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 1) 00:08:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) [ 1033.819059] RDX: 0000000000000009 RSI: 0000000000000002 RDI: 0000000020001480 [ 1033.819071] RBP: 00007fc9219131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1033.819084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1033.819096] R13: 00007ffd6e86bc2f R14: 00007fc921913300 R15: 0000000000022000 [ 1033.819125] [ 1033.904359] journal_path: not usable as path [ 1033.905096] EXT4-fs: error: could not find journal device path [ 1033.917005] journal_path: not usable as path [ 1033.917685] EXT4-fs: error: could not find journal device path 00:08:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) [ 1033.959785] FAULT_INJECTION: forcing a failure. [ 1033.959785] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1033.963188] CPU: 1 UID: 0 PID: 8680 Comm: syz-executor.0 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1033.963218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1033.963231] Call Trace: [ 1033.963239] [ 1033.963247] dump_stack_lvl+0xfa/0x120 [ 1033.963278] should_fail_ex+0x4d7/0x5e0 [ 1033.963320] _copy_from_user+0x30/0xd0 [ 1033.963348] copy_msghdr_from_user+0x88/0x150 [ 1033.963380] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1033.963420] ? lock_acquire+0x15e/0x2f0 [ 1033.963448] ___sys_sendmsg+0xdc/0x1b0 [ 1033.963478] ? __pfx____sys_sendmsg+0x10/0x10 [ 1033.963512] ? proc_fail_nth_write+0x98/0x250 [ 1033.963549] ? lock_acquire+0x15e/0x2f0 [ 1033.963570] ? __fget_files+0x34/0x3b0 [ 1033.963601] ? find_held_lock+0x2b/0x80 [ 1033.963631] ? __fget_files+0x203/0x3b0 [ 1033.963670] ? lock_release+0xc8/0x290 [ 1033.963699] ? __fget_files+0x20d/0x3b0 [ 1033.963738] __sys_sendmsg+0x150/0x200 [ 1033.963767] ? __pfx___sys_sendmsg+0x10/0x10 [ 1033.963800] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1033.963843] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1033.963876] ? ksys_write+0x1a3/0x240 [ 1033.963909] ? __pfx_ksys_write+0x10/0x10 [ 1033.963949] do_syscall_64+0xbf/0x360 [ 1033.963974] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1033.963997] RIP: 0033:0x7fb6c6640b19 [ 1033.964013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1033.964033] RSP: 002b:00007fb6c3bb6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1033.964054] RAX: ffffffffffffffda RBX: 00007fb6c6753f60 RCX: 00007fb6c6640b19 [ 1033.964069] RDX: 0000000000000000 RSI: 0000000020001ac0 RDI: 0000000000000004 [ 1033.964082] RBP: 00007fb6c3bb61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1033.964095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1033.964108] R13: 00007ffeea0428df R14: 00007fb6c3bb6300 R15: 0000000000022000 [ 1033.964136] [ 1034.013510] FAULT_INJECTION: forcing a failure. [ 1034.013510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1034.015703] CPU: 0 UID: 0 PID: 8684 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1034.015746] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1034.015759] Call Trace: [ 1034.015766] [ 1034.015774] dump_stack_lvl+0xfa/0x120 [ 1034.015804] should_fail_ex+0x4d7/0x5e0 [ 1034.015851] _copy_from_user+0x30/0xd0 [ 1034.015879] copy_clone_args_from_user+0x152/0x7a0 [ 1034.015915] ? get_pid_task+0xfd/0x250 [ 1034.015948] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 1034.015983] ? get_pid_task+0x107/0x250 [ 1034.016014] ? proc_fail_nth_write+0x98/0x250 [ 1034.016047] ? find_held_lock+0x2b/0x80 [ 1034.016078] ? ksys_write+0x121/0x240 [ 1034.016110] ? lock_is_held_type+0x9e/0x120 [ 1034.016147] __do_sys_clone3+0xa5/0x280 [ 1034.016167] ? __pfx___do_sys_clone3+0x10/0x10 [ 1034.016195] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1034.016224] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1034.016244] ? perf_trace_run_bpf_submit+0xef/0x180 [ 1034.016277] ? perf_trace_preemptirq_template+0x259/0x430 [ 1034.016315] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1034.016346] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1034.016382] ? __pfx_ksys_write+0x10/0x10 [ 1034.016422] do_syscall_64+0xbf/0x360 [ 1034.016446] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1034.016468] RIP: 0033:0x7f752ccf6b19 [ 1034.016485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1034.016505] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1034.016526] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1034.016540] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1034.016553] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1034.016566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1034.016578] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1034.016607] 00:08:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) 00:08:55 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 2) 00:08:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) 00:08:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) (fail_nth: 2) 00:08:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:55 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:08:55 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) [ 1043.908804] FAULT_INJECTION: forcing a failure. [ 1043.908804] name failslab, interval 1, probability 0, space 0, times 0 [ 1043.909833] CPU: 0 UID: 0 PID: 8700 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1043.909850] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1043.909857] Call Trace: [ 1043.909861] [ 1043.909866] dump_stack_lvl+0xfa/0x120 [ 1043.909888] should_fail_ex+0x4d7/0x5e0 [ 1043.909912] should_failslab+0xc2/0x120 [ 1043.909925] kmem_cache_alloc_node_noprof+0x71/0x470 [ 1043.909943] ? copy_process+0x45a/0x73e0 [ 1043.909967] copy_process+0x45a/0x73e0 [ 1043.909984] ? __pfx__kstrtoull+0x10/0x10 [ 1043.910005] ? lock_acquire+0x15e/0x2f0 [ 1043.910018] ? __might_fault+0xe0/0x190 [ 1043.910033] ? __pfx_copy_process+0x10/0x10 [ 1043.910051] ? __might_fault+0xe0/0x190 [ 1043.910065] ? _copy_from_user+0x5b/0xd0 [ 1043.910082] kernel_clone+0xea/0x820 [ 1043.910101] ? get_pid_task+0xfd/0x250 [ 1043.910122] ? __pfx_kernel_clone+0x10/0x10 [ 1043.910143] ? find_held_lock+0x2b/0x80 [ 1043.910159] ? ksys_write+0x121/0x240 [ 1043.910177] ? lock_is_held_type+0x9e/0x120 [ 1043.910198] __do_sys_clone3+0x1f5/0x280 [ 1043.910208] ? __pfx___do_sys_clone3+0x10/0x10 [ 1043.910229] ? perf_trace_preemptirq_template+0x259/0x430 [ 1043.910251] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1043.910268] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1043.910287] ? __pfx_ksys_write+0x10/0x10 [ 1043.910308] do_syscall_64+0xbf/0x360 [ 1043.910322] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1043.910334] RIP: 0033:0x7f752ccf6b19 [ 1043.910343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1043.910356] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1043.910372] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1043.910383] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1043.910393] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1043.910400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1043.910407] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1043.910422] [ 1043.926471] journal_path: not usable as path [ 1043.928189] EXT4-fs: error: could not find journal device path [ 1043.944212] journal_path: not usable as path [ 1043.945157] EXT4-fs: error: could not find journal device path [ 1043.951074] FAULT_INJECTION: forcing a failure. [ 1043.951074] name failslab, interval 1, probability 0, space 0, times 0 [ 1043.953196] CPU: 1 UID: 0 PID: 8706 Comm: syz-executor.0 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1043.953227] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1043.953241] Call Trace: [ 1043.953248] [ 1043.953256] dump_stack_lvl+0xfa/0x120 [ 1043.953287] should_fail_ex+0x4d7/0x5e0 [ 1043.953329] should_failslab+0xc2/0x120 [ 1043.953353] kmem_cache_alloc_node_noprof+0x71/0x470 [ 1043.953387] ? __alloc_skb+0x2ab/0x370 [ 1043.953423] __alloc_skb+0x2ab/0x370 [ 1043.953452] ? __pfx___alloc_skb+0x10/0x10 00:08:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:08:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) [ 1043.953485] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 1043.953525] netlink_alloc_large_skb+0x69/0x150 [ 1043.953559] netlink_sendmsg+0x676/0xd80 [ 1043.953596] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1043.953640] ____sys_sendmsg+0xa67/0xc20 [ 1043.953664] ? copy_msghdr_from_user+0xfb/0x150 [ 1043.953696] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1043.953729] ? lock_acquire+0x15e/0x2f0 [ 1043.953758] ___sys_sendmsg+0x10f/0x1b0 [ 1043.953790] ? __pfx____sys_sendmsg+0x10/0x10 [ 1043.953834] ? proc_fail_nth_write+0x98/0x250 [ 1043.953873] ? lock_acquire+0x15e/0x2f0 [ 1043.953895] ? __fget_files+0x34/0x3b0 [ 1043.953927] ? find_held_lock+0x2b/0x80 [ 1043.953958] ? __fget_files+0x203/0x3b0 [ 1043.953989] ? lock_release+0xc8/0x290 [ 1043.954016] ? __fget_files+0x20d/0x3b0 [ 1043.954057] __sys_sendmsg+0x150/0x200 [ 1043.954087] ? __pfx___sys_sendmsg+0x10/0x10 [ 1043.954128] ? __pfx_ksys_write+0x10/0x10 [ 1043.954172] do_syscall_64+0xbf/0x360 [ 1043.954197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1043.954221] RIP: 0033:0x7fb6c6640b19 [ 1043.954239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1043.954261] RSP: 002b:00007fb6c3bb6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1043.954283] RAX: ffffffffffffffda RBX: 00007fb6c6753f60 RCX: 00007fb6c6640b19 [ 1043.954298] RDX: 0000000000000000 RSI: 0000000020001ac0 RDI: 0000000000000004 [ 1043.954312] RBP: 00007fb6c3bb61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1043.954325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1043.954339] R13: 00007ffeea0428df R14: 00007fb6c3bb6300 R15: 0000000000022000 [ 1043.954369] [ 1044.007922] FAULT_INJECTION: forcing a failure. [ 1044.007922] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1044.009889] CPU: 1 UID: 0 PID: 8707 Comm: syz-executor.4 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1044.009921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1044.009934] Call Trace: [ 1044.009941] [ 1044.009950] dump_stack_lvl+0xfa/0x120 [ 1044.009979] should_fail_ex+0x4d7/0x5e0 [ 1044.010020] _copy_to_user+0x32/0xd0 [ 1044.010050] simple_read_from_buffer+0xe0/0x180 [ 1044.010084] proc_fail_nth_read+0x189/0x270 [ 1044.010121] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1044.010156] ? security_file_permission+0x22/0x90 [ 1044.010184] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1044.010218] vfs_read+0x1eb/0xbe0 [ 1044.010258] ? __pfx_vfs_read+0x10/0x10 [ 1044.010293] ? lock_release+0xc8/0x290 [ 1044.010322] ? __fget_files+0x20d/0x3b0 [ 1044.010366] ksys_read+0x121/0x240 [ 1044.010398] ? __pfx_ksys_read+0x10/0x10 [ 1044.010441] do_syscall_64+0xbf/0x360 [ 1044.010467] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1044.010491] RIP: 0033:0x7fc92435069c [ 1044.010508] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1044.010530] RSP: 002b:00007fc921913170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1044.010552] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc92435069c [ 1044.010567] RDX: 000000000000000f RSI: 00007fc9219131e0 RDI: 0000000000000006 [ 1044.010581] RBP: 00007fc9219131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1044.010594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1044.010608] R13: 00007ffd6e86bc2f R14: 00007fc921913300 R15: 0000000000022000 [ 1044.010639] 00:08:55 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:08:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) poll(&(0x7f0000001480)=[{r3}, {r1, 0x18}, {0xffffffffffffffff, 0x8}, {r2, 0x8000}], 0x4, 0x9) 00:08:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1044.180368] journal_path: not usable as path [ 1044.181155] EXT4-fs: error: could not find journal device path [ 1044.196315] journal_path: not usable as path [ 1044.197285] EXT4-fs: error: could not find journal device path 00:09:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:09:07 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r1, 0x18}, {r5, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:09:07 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:09:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 3) 00:09:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) (fail_nth: 1) 00:09:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) [ 1056.320408] FAULT_INJECTION: forcing a failure. [ 1056.320408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1056.322155] CPU: 0 UID: 0 PID: 8735 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1056.322184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1056.322197] Call Trace: [ 1056.322204] [ 1056.322212] dump_stack_lvl+0xfa/0x120 [ 1056.322240] should_fail_ex+0x4d7/0x5e0 [ 1056.322278] should_fail_alloc_page+0xe0/0x110 [ 1056.322305] prepare_alloc_pages+0x1af/0x500 [ 1056.322339] __alloc_frozen_pages_noprof+0x17f/0x1f10 [ 1056.322369] ? find_held_lock+0x2/0x80 [ 1056.322408] ? lock_release+0xc8/0x290 [ 1056.322433] ? lock_acquire+0x15e/0x2f0 [ 1056.322454] ? __memcg_slab_post_alloc_hook+0x443/0x9d0 [ 1056.322486] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1056.322518] ? lock_release+0xc8/0x290 [ 1056.322543] ? __memcg_slab_post_alloc_hook+0x4ac/0x9d0 [ 1056.322576] ? __create_object+0x59/0x80 [ 1056.322605] ? __asan_memset+0x24/0x50 [ 1056.322640] __alloc_pages_noprof+0xc/0x1b0 [ 1056.322669] copy_process+0x4ea/0x73e0 [ 1056.322702] ? __pfx__kstrtoull+0x10/0x10 [ 1056.322738] ? lock_acquire+0x15e/0x2f0 [ 1056.322775] ? __might_fault+0xe0/0x190 [ 1056.322801] ? __pfx_copy_process+0x10/0x10 [ 1056.322841] ? __might_fault+0xe0/0x190 [ 1056.322867] ? _copy_from_user+0x5b/0xd0 [ 1056.322897] kernel_clone+0xea/0x820 [ 1056.322928] ? get_pid_task+0xfd/0x250 [ 1056.322960] ? __pfx_kernel_clone+0x10/0x10 [ 1056.323000] ? find_held_lock+0x2b/0x80 [ 1056.323028] ? ksys_write+0x121/0x240 [ 1056.323058] ? lock_is_held_type+0x9e/0x120 [ 1056.323094] __do_sys_clone3+0x1f5/0x280 [ 1056.323113] ? __pfx___do_sys_clone3+0x10/0x10 [ 1056.323151] ? perf_trace_preemptirq_template+0x259/0x430 [ 1056.323187] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1056.323218] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1056.323253] ? __pfx_ksys_write+0x10/0x10 [ 1056.323292] do_syscall_64+0xbf/0x360 [ 1056.323315] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1056.323337] RIP: 0033:0x7f752ccf6b19 [ 1056.323353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1056.323374] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1056.323395] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1056.323409] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1056.323422] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1056.323434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1056.323447] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1056.323475] [ 1056.345649] journal_path: not usable as path [ 1056.360403] EXT4-fs: error: could not find journal device path 00:09:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1056.427942] journal_path: not usable as path [ 1056.428760] EXT4-fs: error: could not find journal device path 00:09:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:09:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:09:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 4) 00:09:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) 00:09:07 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r4, 0x8}, {r3, 0x8000}], 0x4, 0x9) 00:09:07 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:09:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1056.617678] FAULT_INJECTION: forcing a failure. [ 1056.617678] name failslab, interval 1, probability 0, space 0, times 0 [ 1056.619144] CPU: 0 UID: 0 PID: 8755 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1056.619169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1056.619180] Call Trace: [ 1056.619186] [ 1056.619193] dump_stack_lvl+0xfa/0x120 [ 1056.619219] should_fail_ex+0x4d7/0x5e0 [ 1056.619252] ? prepare_creds+0x2c/0x7e0 [ 1056.619270] should_failslab+0xc2/0x120 [ 1056.619289] kmem_cache_alloc_noprof+0x5f/0x470 [ 1056.619314] ? get_random_u64+0x37f/0x660 [ 1056.619343] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1056.619376] prepare_creds+0x2c/0x7e0 [ 1056.619396] copy_creds+0x7a/0xa20 [ 1056.619418] copy_process+0xf5a/0x73e0 [ 1056.619447] ? __pfx__kstrtoull+0x10/0x10 [ 1056.619485] ? __pfx_copy_process+0x10/0x10 [ 1056.619514] ? __might_fault+0xe0/0x190 [ 1056.619538] ? _copy_from_user+0x5b/0xd0 [ 1056.619564] kernel_clone+0xea/0x820 [ 1056.619591] ? get_pid_task+0xfd/0x250 [ 1056.619620] ? __pfx_kernel_clone+0x10/0x10 [ 1056.619655] ? find_held_lock+0x2b/0x80 [ 1056.619680] ? ksys_write+0x121/0x240 [ 1056.619708] ? lock_is_held_type+0x9e/0x120 [ 1056.619740] __do_sys_clone3+0x1f5/0x280 [ 1056.619757] ? __pfx___do_sys_clone3+0x10/0x10 [ 1056.619789] ? perf_trace_preemptirq_template+0x259/0x430 [ 1056.619826] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1056.619853] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1056.619884] ? __pfx_ksys_write+0x10/0x10 [ 1056.619918] do_syscall_64+0xbf/0x360 [ 1056.619938] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1056.619957] RIP: 0033:0x7f752ccf6b19 [ 1056.619971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1056.619989] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1056.620007] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1056.620019] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1056.620030] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1056.620041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1056.620052] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1056.620076] 00:09:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1056.676310] journal_path: not usable as path [ 1056.677080] EXT4-fs: error: could not find journal device path 00:09:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 5) [ 1056.688717] journal_path: not usable as path [ 1056.689431] EXT4-fs: error: could not find journal device path 00:09:07 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r3, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:17 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r2, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:17 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 6) 00:09:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) 00:09:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x8}, {r2}], 0x2, 0x9) 00:09:17 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:09:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:17 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/if_inet6\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r5) bind$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e20, 0x101, @mcast1, 0xa200}, 0x1c) dup2(r4, 0xffffffffffffffff) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x8000000}, 0x1c) r7 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r7, 0x0, 0x0, 0x80000) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x200800, 0x0) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f00000000c0)=[r7, r2, r0, r8], 0x4) [ 1065.868195] journal_path: not usable as path [ 1065.868623] EXT4-fs: error: could not find journal device path [ 1065.871538] FAULT_INJECTION: forcing a failure. [ 1065.871538] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1065.873940] CPU: 1 UID: 0 PID: 8790 Comm: syz-executor.0 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1065.873975] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1065.873990] Call Trace: [ 1065.873998] [ 1065.874008] dump_stack_lvl+0xfa/0x120 [ 1065.874042] should_fail_ex+0x4d7/0x5e0 [ 1065.874086] _copy_from_iter+0x1dc/0x15b0 [ 1065.874118] ? lock_acquire+0x15e/0x2f0 [ 1065.874144] ? __virt_addr_valid+0x1c6/0x5d0 [ 1065.874182] ? find_held_lock+0x2b/0x80 [ 1065.874218] ? __pfx__copy_from_iter+0x10/0x10 [ 1065.874246] ? lock_release+0xc8/0x290 [ 1065.874276] ? __virt_addr_valid+0x100/0x5d0 [ 1065.874314] ? __check_object_size+0x57b/0x880 [ 1065.874353] netlink_sendmsg+0x809/0xd80 [ 1065.874397] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1065.874446] ____sys_sendmsg+0xa67/0xc20 [ 1065.874474] ? copy_msghdr_from_user+0xfb/0x150 [ 1065.874509] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1065.874546] ? lock_acquire+0x15e/0x2f0 [ 1065.874576] ___sys_sendmsg+0x10f/0x1b0 [ 1065.874612] ? __pfx____sys_sendmsg+0x10/0x10 [ 1065.874653] ? proc_fail_nth_write+0x98/0x250 [ 1065.874696] ? lock_acquire+0x15e/0x2f0 [ 1065.874721] ? __fget_files+0x34/0x3b0 [ 1065.874765] ? find_held_lock+0x2b/0x80 [ 1065.874799] ? __fget_files+0x203/0x3b0 [ 1065.874852] ? lock_release+0xc8/0x290 [ 1065.874883] ? __fget_files+0x20d/0x3b0 [ 1065.874929] __sys_sendmsg+0x150/0x200 [ 1065.874963] ? __pfx___sys_sendmsg+0x10/0x10 [ 1065.875009] ? __pfx_ksys_write+0x10/0x10 [ 1065.875057] do_syscall_64+0xbf/0x360 [ 1065.875086] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1065.875112] RIP: 0033:0x7fb6c6640b19 [ 1065.875132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1065.875156] RSP: 002b:00007fb6c3bb6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1065.875181] RAX: ffffffffffffffda RBX: 00007fb6c6753f60 RCX: 00007fb6c6640b19 [ 1065.875198] RDX: 0000000000000000 RSI: 0000000020001ac0 RDI: 0000000000000004 [ 1065.875213] RBP: 00007fb6c3bb61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1065.875229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1065.875244] R13: 00007ffeea0428df R14: 00007fb6c3bb6300 R15: 0000000000022000 [ 1065.875278] [ 1065.880297] journal_path: not usable as path [ 1065.894428] EXT4-fs: error: could not find journal device path 00:09:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) 00:09:17 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1065.947606] FAULT_INJECTION: forcing a failure. [ 1065.947606] name failslab, interval 1, probability 0, space 0, times 0 [ 1065.948596] CPU: 0 UID: 0 PID: 8801 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1065.948612] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1065.948619] Call Trace: [ 1065.948623] [ 1065.948628] dump_stack_lvl+0xfa/0x120 [ 1065.948646] should_fail_ex+0x4d7/0x5e0 [ 1065.948666] ? security_prepare_creds+0x101/0x160 [ 1065.948680] should_failslab+0xc2/0x120 [ 1065.948693] __kmalloc_noprof+0xb4/0x4b0 [ 1065.948712] security_prepare_creds+0x101/0x160 [ 1065.948727] prepare_creds+0x579/0x7e0 [ 1065.948741] copy_creds+0x7a/0xa20 [ 1065.948754] copy_process+0xf5a/0x73e0 [ 1065.948772] ? __pfx__kstrtoull+0x10/0x10 [ 1065.948797] ? __pfx_copy_process+0x10/0x10 [ 1065.948819] ? __might_fault+0xe0/0x190 [ 1065.948834] ? _copy_from_user+0x5b/0xd0 [ 1065.948851] kernel_clone+0xea/0x820 [ 1065.948868] ? get_pid_task+0xfd/0x250 [ 1065.948886] ? __pfx_kernel_clone+0x10/0x10 [ 1065.948907] ? find_held_lock+0x2b/0x80 [ 1065.948924] ? ksys_write+0x121/0x240 [ 1065.948942] ? lock_is_held_type+0x9e/0x120 [ 1065.948962] __do_sys_clone3+0x1f5/0x280 [ 1065.948972] ? __pfx___do_sys_clone3+0x10/0x10 [ 1065.948992] ? perf_trace_preemptirq_template+0x259/0x430 [ 1065.949013] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1065.949030] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1065.949049] ? __pfx_ksys_write+0x10/0x10 [ 1065.949070] do_syscall_64+0xbf/0x360 [ 1065.949083] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1065.949096] RIP: 0033:0x7f752ccf6b19 [ 1065.949105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1065.949116] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1065.949127] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1065.949135] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1065.949142] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1065.949149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1065.949155] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1065.949171] 00:09:26 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) 00:09:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x10}, 0xfffffffffffffe96) 00:09:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x64}, {r2}], 0x2, 0x9) 00:09:26 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:09:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 7) [ 1075.079498] FAULT_INJECTION: forcing a failure. [ 1075.079498] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.080617] CPU: 0 UID: 0 PID: 8819 Comm: syz-executor.0 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1075.080633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1075.080640] Call Trace: [ 1075.080645] [ 1075.080650] dump_stack_lvl+0xfa/0x120 [ 1075.080669] should_fail_ex+0x4d7/0x5e0 [ 1075.080693] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x290 [ 1075.080715] should_failslab+0xc2/0x120 [ 1075.080728] __kmalloc_noprof+0xb4/0x4b0 [ 1075.080746] ? avc_has_perm_noaudit+0x150/0x3d0 [ 1075.080763] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x290 [ 1075.080786] genl_family_rcv_msg_doit+0xab/0x2f0 [ 1075.080804] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10 [ 1075.080827] ? __pfx___mutex_lock+0x10/0x10 [ 1075.080841] ? cap_capable+0xdb/0x3b0 [ 1075.080864] ? security_capable+0x2f/0x90 [ 1075.080888] genl_rcv_msg+0x532/0x7e0 [ 1075.080908] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1075.080926] ? __pfx_nl802154_pre_doit+0x10/0x10 [ 1075.080946] ? __pfx_nl802154_set_channel+0x10/0x10 [ 1075.080962] ? __pfx_nl802154_post_doit+0x10/0x10 [ 1075.080981] ? __lock_acquire+0x694/0x1b70 [ 1075.080997] netlink_rcv_skb+0x147/0x430 [ 1075.081014] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1075.081032] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1075.081055] ? netlink_deliver_tap+0x1ae/0xce0 [ 1075.081070] ? is_vmalloc_addr+0x86/0xa0 [ 1075.081088] genl_rcv+0x28/0x40 [ 1075.081104] netlink_unicast+0x53d/0x7f0 [ 1075.081122] ? __pfx_netlink_unicast+0x10/0x10 [ 1075.081143] netlink_sendmsg+0x8ac/0xd80 [ 1075.081161] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1075.081184] ____sys_sendmsg+0xa67/0xc20 [ 1075.081198] ? copy_msghdr_from_user+0xfb/0x150 [ 1075.081215] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1075.081233] ? lock_acquire+0x15e/0x2f0 [ 1075.081247] ___sys_sendmsg+0x10f/0x1b0 [ 1075.081263] ? __pfx____sys_sendmsg+0x10/0x10 [ 1075.081282] ? proc_fail_nth_write+0x98/0x250 [ 1075.081302] ? lock_acquire+0x15e/0x2f0 [ 1075.081313] ? __fget_files+0x34/0x3b0 [ 1075.081330] ? find_held_lock+0x2b/0x80 [ 1075.081346] ? __fget_files+0x203/0x3b0 [ 1075.081362] ? lock_release+0xc8/0x290 [ 1075.081376] ? __fget_files+0x20d/0x3b0 [ 1075.081397] __sys_sendmsg+0x150/0x200 [ 1075.081412] ? __pfx___sys_sendmsg+0x10/0x10 [ 1075.081433] ? __pfx_ksys_write+0x10/0x10 [ 1075.081456] do_syscall_64+0xbf/0x360 [ 1075.081471] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1075.081483] RIP: 0033:0x7fb6c6640b19 [ 1075.081492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.081503] RSP: 002b:00007fb6c3bb6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1075.081514] RAX: ffffffffffffffda RBX: 00007fb6c6753f60 RCX: 00007fb6c6640b19 [ 1075.081522] RDX: 0000000000000000 RSI: 0000000020001ac0 RDI: 0000000000000004 [ 1075.081529] RBP: 00007fb6c3bb61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1075.081536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1075.081543] R13: 00007ffeea0428df R14: 00007fb6c3bb6300 R15: 0000000000022000 [ 1075.081559] [ 1075.102759] journal_path: not usable as path [ 1075.106105] EXT4-fs: error: could not find journal device path [ 1075.120959] journal_path: not usable as path [ 1075.121666] EXT4-fs: error: could not find journal device path 00:09:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 00:09:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xb16, &(0x7f0000000100)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = dup2(r0, r0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000080)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x10000000}) dup2(r2, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:09:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x420}, {r2}], 0x2, 0x9) [ 1075.176585] FAULT_INJECTION: forcing a failure. [ 1075.176585] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.177633] CPU: 0 UID: 0 PID: 8832 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1075.177649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1075.177657] Call Trace: [ 1075.177661] [ 1075.177666] dump_stack_lvl+0xfa/0x120 [ 1075.177682] should_fail_ex+0x4d7/0x5e0 [ 1075.177702] ? create_user_ns+0x1ea/0xdd0 [ 1075.177716] should_failslab+0xc2/0x120 [ 1075.177727] kmem_cache_alloc_noprof+0x5f/0x470 [ 1075.177747] create_user_ns+0x1ea/0xdd0 [ 1075.177761] ? prepare_creds+0x58d/0x7e0 [ 1075.177775] copy_creds+0x497/0xa20 [ 1075.177789] copy_process+0xf5a/0x73e0 [ 1075.177812] ? __pfx__kstrtoull+0x10/0x10 [ 1075.177836] ? __pfx_copy_process+0x10/0x10 [ 1075.177855] ? __might_fault+0xe0/0x190 [ 1075.177870] ? _copy_from_user+0x5b/0xd0 00:09:26 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1075.177886] kernel_clone+0xea/0x820 [ 1075.177903] ? get_pid_task+0xfd/0x250 [ 1075.177922] ? __pfx_kernel_clone+0x10/0x10 [ 1075.177944] ? find_held_lock+0x2b/0x80 [ 1075.177960] ? ksys_write+0x121/0x240 [ 1075.177977] ? lock_is_held_type+0x9e/0x120 [ 1075.177998] __do_sys_clone3+0x1f5/0x280 [ 1075.178009] ? __pfx___do_sys_clone3+0x10/0x10 [ 1075.178029] ? perf_trace_preemptirq_template+0x259/0x430 [ 1075.178050] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1075.178069] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1075.178091] ? __pfx_ksys_write+0x10/0x10 [ 1075.178112] do_syscall_64+0xbf/0x360 [ 1075.178126] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1075.178137] RIP: 0033:0x7f752ccf6b19 [ 1075.178146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.178157] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1075.178168] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1075.178176] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1075.178183] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1075.178190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1075.178197] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1075.178212] 00:09:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) ioctl$RTC_WIE_ON(r2, 0x700f) r4 = dup2(r1, r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000100)={0x8000, 0x8000}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:09:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 8) 00:09:26 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:09:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) [ 1075.347928] journal_path: not usable as path [ 1075.348659] EXT4-fs: error: could not find journal device path 00:09:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 9) [ 1075.358406] journal_path: not usable as path [ 1075.359099] EXT4-fs: error: could not find journal device path 00:09:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = getpid() pidfd_open(r2, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x80, 0x7f, 0xad, 0x0, 0x7, 0x10, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000080), 0x9}, 0x1881, 0x7, 0x0, 0x8, 0xc37, 0x5, 0x2, 0x0, 0x1e68, 0x0, 0x458af75f}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:09:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x2004}, {r2}], 0x2, 0x9) [ 1075.432516] FAULT_INJECTION: forcing a failure. [ 1075.432516] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.434334] CPU: 0 UID: 0 PID: 8855 Comm: syz-executor.0 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1075.434351] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1075.434359] Call Trace: [ 1075.434363] [ 1075.434368] dump_stack_lvl+0xfa/0x120 [ 1075.434387] should_fail_ex+0x4d7/0x5e0 [ 1075.434412] should_failslab+0xc2/0x120 [ 1075.434425] kmem_cache_alloc_node_noprof+0x71/0x470 [ 1075.434443] ? __alloc_skb+0x2ab/0x370 [ 1075.434463] __alloc_skb+0x2ab/0x370 [ 1075.434477] ? __pfx___alloc_skb+0x10/0x10 [ 1075.434498] netlink_ack+0x167/0xbf0 [ 1075.434522] netlink_rcv_skb+0x344/0x430 [ 1075.434538] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1075.434557] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1075.434579] ? netlink_deliver_tap+0x1ae/0xce0 [ 1075.434594] ? is_vmalloc_addr+0x86/0xa0 [ 1075.434614] genl_rcv+0x28/0x40 [ 1075.434629] netlink_unicast+0x53d/0x7f0 [ 1075.434647] ? __pfx_netlink_unicast+0x10/0x10 [ 1075.434667] netlink_sendmsg+0x8ac/0xd80 [ 1075.434686] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1075.434708] ____sys_sendmsg+0xa67/0xc20 [ 1075.434721] ? copy_msghdr_from_user+0xfb/0x150 [ 1075.434737] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1075.434755] ? lock_acquire+0x15e/0x2f0 [ 1075.434770] ___sys_sendmsg+0x10f/0x1b0 [ 1075.434787] ? __pfx____sys_sendmsg+0x10/0x10 [ 1075.434805] ? proc_fail_nth_write+0x98/0x250 [ 1075.434831] ? lock_acquire+0x15e/0x2f0 [ 1075.434842] ? __fget_files+0x34/0x3b0 [ 1075.434859] ? find_held_lock+0x2b/0x80 [ 1075.434876] ? __fget_files+0x203/0x3b0 [ 1075.434891] ? lock_release+0xc8/0x290 [ 1075.434905] ? __fget_files+0x20d/0x3b0 [ 1075.434933] __sys_sendmsg+0x150/0x200 [ 1075.434948] ? __pfx___sys_sendmsg+0x10/0x10 [ 1075.434969] ? __pfx_ksys_write+0x10/0x10 [ 1075.434993] do_syscall_64+0xbf/0x360 [ 1075.435007] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1075.435020] RIP: 0033:0x7fb6c6640b19 [ 1075.435029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.435040] RSP: 002b:00007fb6c3bb6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1075.435052] RAX: ffffffffffffffda RBX: 00007fb6c6753f60 RCX: 00007fb6c6640b19 [ 1075.435060] RDX: 0000000000000000 RSI: 0000000020001ac0 RDI: 0000000000000004 [ 1075.435068] RBP: 00007fb6c3bb61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1075.435075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1075.435082] R13: 00007ffeea0428df R14: 00007fb6c3bb6300 R15: 0000000000022000 [ 1075.435098] 00:09:36 executing program 7: r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x4000}, {r2}], 0x2, 0x9) 00:09:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:36 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:09:36 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) 00:09:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/icmp6\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x3, 0x80, 0x9, 0x1, 0x4, 0x1f, 0x0, 0x37, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_config_ext={0x7ff, 0x9}, 0x0, 0x0, 0x8, 0x5, 0x3f, 0x8000, 0x5, 0x0, 0x8001, 0x0, 0x6}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:09:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 10) [ 1084.869096] FAULT_INJECTION: forcing a failure. [ 1084.869096] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.870074] CPU: 0 UID: 0 PID: 8874 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1084.870090] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1084.870097] Call Trace: [ 1084.870102] [ 1084.870106] dump_stack_lvl+0xfa/0x120 [ 1084.870125] should_fail_ex+0x4d7/0x5e0 [ 1084.870146] should_failslab+0xc2/0x120 [ 1084.870159] __kmalloc_node_track_caller_noprof+0xb8/0x490 [ 1084.870176] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1084.870189] ? setup_userns_sysctls+0x51/0x190 [ 1084.870209] kmemdup_noprof+0x2b/0x60 [ 1084.870228] setup_userns_sysctls+0x51/0x190 [ 1084.870246] create_user_ns+0x978/0xdd0 [ 1084.870264] copy_creds+0x497/0xa20 [ 1084.870278] copy_process+0xf5a/0x73e0 [ 1084.870297] ? __pfx__kstrtoull+0x10/0x10 [ 1084.870321] ? __pfx_copy_process+0x10/0x10 [ 1084.870339] ? __might_fault+0xe0/0x190 [ 1084.870355] ? _copy_from_user+0x5b/0xd0 [ 1084.870371] kernel_clone+0xea/0x820 [ 1084.870388] ? get_pid_task+0xfd/0x250 [ 1084.870406] ? __pfx_kernel_clone+0x10/0x10 [ 1084.870428] ? find_held_lock+0x2b/0x80 [ 1084.870444] ? ksys_write+0x121/0x240 [ 1084.870462] ? lock_is_held_type+0x9e/0x120 [ 1084.870482] __do_sys_clone3+0x1f5/0x280 [ 1084.870492] ? __pfx___do_sys_clone3+0x10/0x10 [ 1084.870513] ? perf_trace_preemptirq_template+0x259/0x430 [ 1084.870533] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1084.870549] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1084.870568] ? __pfx_ksys_write+0x10/0x10 [ 1084.870590] do_syscall_64+0xbf/0x360 [ 1084.870603] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1084.870615] RIP: 0033:0x7f752ccf6b19 [ 1084.870624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1084.870635] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1084.870646] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1084.870654] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1084.870661] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.870668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1084.870674] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1084.870690] 00:09:36 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) [ 1084.932647] journal_path: not usable as path [ 1084.933445] EXT4-fs: error: could not find journal device path [ 1084.938025] journal_path: not usable as path [ 1084.938685] EXT4-fs: error: could not find journal device path 00:09:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x6400}, {r2}], 0x2, 0x9) 00:09:45 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:45 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:09:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) 00:09:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 11) 00:09:45 executing program 7: r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000080)) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1094.298534] FAULT_INJECTION: forcing a failure. [ 1094.298534] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.299602] CPU: 0 UID: 0 PID: 8904 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1094.299619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1094.299627] Call Trace: [ 1094.299631] [ 1094.299636] dump_stack_lvl+0xfa/0x120 [ 1094.299656] should_fail_ex+0x4d7/0x5e0 [ 1094.299681] ? __register_sysctl_table+0xb5/0x16a0 [ 1094.299697] should_failslab+0xc2/0x120 [ 1094.299710] __kmalloc_noprof+0xb4/0x4b0 [ 1094.299730] __register_sysctl_table+0xb5/0x16a0 [ 1094.299745] ? __kasan_kmalloc+0x7f/0x90 [ 1094.299758] ? __kmalloc_node_track_caller_noprof+0x20b/0x490 [ 1094.299775] ? __pfx___register_sysctl_table+0x10/0x10 [ 1094.299788] ? setup_userns_sysctls+0x51/0x190 [ 1094.299813] ? __asan_memcpy+0x3d/0x60 [ 1094.299831] setup_userns_sysctls+0xcb/0x190 [ 1094.299849] create_user_ns+0x978/0xdd0 [ 1094.299868] copy_creds+0x497/0xa20 [ 1094.299882] copy_process+0xf5a/0x73e0 [ 1094.299901] ? __pfx__kstrtoull+0x10/0x10 [ 1094.299925] ? __pfx_copy_process+0x10/0x10 [ 1094.299943] ? __might_fault+0xe0/0x190 [ 1094.299959] ? _copy_from_user+0x5b/0xd0 [ 1094.299976] kernel_clone+0xea/0x820 [ 1094.299993] ? get_pid_task+0xfd/0x250 [ 1094.300011] ? __pfx_kernel_clone+0x10/0x10 [ 1094.300033] ? find_held_lock+0x2b/0x80 [ 1094.300050] ? ksys_write+0x121/0x240 [ 1094.300070] ? lock_is_held_type+0x9e/0x120 [ 1094.300094] __do_sys_clone3+0x1f5/0x280 [ 1094.300104] ? __pfx___do_sys_clone3+0x10/0x10 [ 1094.300124] ? perf_trace_preemptirq_template+0x259/0x430 [ 1094.300146] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1094.300162] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1094.300183] ? __pfx_ksys_write+0x10/0x10 [ 1094.300205] do_syscall_64+0xbf/0x360 [ 1094.300218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1094.300231] RIP: 0033:0x7f752ccf6b19 [ 1094.300240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1094.300251] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1094.300263] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1094.300271] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1094.300278] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1094.300285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1094.300292] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1094.300308] [ 1094.329970] journal_path: not usable as path [ 1094.330592] EXT4-fs: error: could not find journal device path [ 1094.335515] journal_path: not usable as path [ 1094.336114] EXT4-fs: error: could not find journal device path 00:09:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 12) 00:09:45 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:09:45 executing program 7: r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:09:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 00:09:45 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}, 0x1c) 00:09:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) (fail_nth: 13) [ 1094.456389] journal_path: not usable as path [ 1094.456790] EXT4-fs: error: could not find journal device path [ 1094.471732] journal_path: not usable as path [ 1094.472129] EXT4-fs: error: could not find journal device path 00:09:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1094.517576] FAULT_INJECTION: forcing a failure. [ 1094.517576] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1094.518847] CPU: 1 UID: 0 PID: 8929 Comm: syz-executor.0 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1094.518890] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1094.518909] Call Trace: [ 1094.518918] [ 1094.518928] dump_stack_lvl+0xfa/0x120 [ 1094.518949] should_fail_ex+0x4d7/0x5e0 [ 1094.518975] _copy_to_user+0x32/0xd0 [ 1094.518995] simple_read_from_buffer+0xe0/0x180 [ 1094.519018] proc_fail_nth_read+0x189/0x270 [ 1094.519042] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1094.519064] ? security_file_permission+0x22/0x90 [ 1094.519094] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1094.519116] vfs_read+0x1eb/0xbe0 [ 1094.519140] ? __pfx_vfs_read+0x10/0x10 [ 1094.519162] ? lock_release+0xc8/0x290 [ 1094.519182] ? __fget_files+0x20d/0x3b0 [ 1094.519209] ksys_read+0x121/0x240 [ 1094.519229] ? __pfx_ksys_read+0x10/0x10 [ 1094.519256] do_syscall_64+0xbf/0x360 [ 1094.519273] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1094.519288] RIP: 0033:0x7fb6c65f369c [ 1094.519300] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1094.519313] RSP: 002b:00007fb6c3bb6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1094.519328] RAX: ffffffffffffffda RBX: 0000000000000028 RCX: 00007fb6c65f369c [ 1094.519337] RDX: 000000000000000f RSI: 00007fb6c3bb61e0 RDI: 0000000000000003 [ 1094.519346] RBP: 00007fb6c3bb61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1094.519355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1094.519363] R13: 00007ffeea0428df R14: 00007fb6c3bb6300 R15: 0000000000022000 [ 1094.519383] 00:09:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) 00:09:45 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:09:45 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x1) pread64(r1, &(0x7f00000001c0)=""/209, 0xd1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1094.594340] FAULT_INJECTION: forcing a failure. [ 1094.594340] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.595314] CPU: 0 UID: 0 PID: 8941 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1094.595331] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1094.595339] Call Trace: [ 1094.595343] [ 1094.595348] dump_stack_lvl+0xfa/0x120 [ 1094.595368] should_fail_ex+0x4d7/0x5e0 [ 1094.595394] ? __register_sysctl_table+0xd4f/0x16a0 [ 1094.595410] should_failslab+0xc2/0x120 [ 1094.595424] __kmalloc_noprof+0xb4/0x4b0 [ 1094.595440] ? lock_release+0xc8/0x290 [ 1094.595458] __register_sysctl_table+0xd4f/0x16a0 [ 1094.595475] ? __pfx___register_sysctl_table+0x10/0x10 [ 1094.595489] ? setup_userns_sysctls+0x51/0x190 [ 1094.595508] ? __asan_memcpy+0x3d/0x60 [ 1094.595528] setup_userns_sysctls+0xcb/0x190 [ 1094.595546] create_user_ns+0x978/0xdd0 [ 1094.595564] copy_creds+0x497/0xa20 [ 1094.595578] copy_process+0xf5a/0x73e0 00:09:45 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1094.595597] ? __pfx__kstrtoull+0x10/0x10 [ 1094.595624] ? __pfx_copy_process+0x10/0x10 [ 1094.595645] ? __might_fault+0xe0/0x190 [ 1094.595661] ? _copy_from_user+0x5b/0xd0 [ 1094.595677] kernel_clone+0xea/0x820 [ 1094.595694] ? get_pid_task+0xfd/0x250 [ 1094.595713] ? __pfx_kernel_clone+0x10/0x10 [ 1094.595735] ? find_held_lock+0x2b/0x80 [ 1094.595751] ? ksys_write+0x121/0x240 [ 1094.595770] ? lock_is_held_type+0x9e/0x120 [ 1094.595791] __do_sys_clone3+0x1f5/0x280 [ 1094.595801] ? __pfx___do_sys_clone3+0x10/0x10 [ 1094.595826] ? perf_trace_preemptirq_template+0x259/0x430 [ 1094.595847] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1094.595863] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1094.595882] ? __pfx_ksys_write+0x10/0x10 [ 1094.595903] do_syscall_64+0xbf/0x360 [ 1094.595917] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1094.595929] RIP: 0033:0x7f752ccf6b19 [ 1094.595939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1094.595950] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1094.595961] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1094.595970] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1094.595979] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1094.595986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1094.595993] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1094.596008] [ 1094.614278] sysctl could not get directory: /user -12 00:09:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1094.640500] journal_path: not usable as path [ 1094.641040] EXT4-fs: error: could not find journal device path 00:09:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1094.658019] journal_path: not usable as path [ 1094.658496] EXT4-fs: error: could not find journal device path 00:09:53 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x0, 0x8}, {r2}], 0x2, 0x9) 00:09:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:53 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:09:53 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:09:53 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x0, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) 00:09:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xf7, 0x1, 0x5, 0x40, 0x0, 0x9000000000000000, 0x2100, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x800, 0x7, 0x400, 0x9, 0x4, 0x954, 0x1, 0x0, 0x80000001, 0x0, 0x6}, 0x0, 0xe, r2, 0x9) r4 = ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r5, 0x0, 0x0, 0x80800) close_range(r4, r5, 0x2) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r6, 0x0, 0x0, 0x80800) ioctl$sock_inet_SIOCGIFBRDADDR(r6, 0x8919, &(0x7f00000001c0)={'caif0\x00', {0x2, 0x0, @remote}}) 00:09:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x0, 0x64}, {r2}], 0x2, 0x9) [ 1102.841609] journal_path: not usable as path [ 1102.842091] EXT4-fs: error: could not find journal device path [ 1102.848421] journal_path: not usable as path [ 1102.849093] EXT4-fs: error: could not find journal device path 00:09:54 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:09:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:02 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x13, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:10:02 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x5, 0xec, 0xa9, 0x7f, 0x0, 0x1, 0x640, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x4, 0x4, 0xfffffffc, 0x1, 0xff, 0x1ff, 0x101, 0x0, 0x1c0000, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r1, 0x3) r4 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3, 0x1, 0x8, 0x7, 0x0, 0x800, 0x40000, 0xe, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x1, @perf_config_ext={0x7ff, 0x6582}, 0x390, 0xf37, 0xffff, 0x8, 0x7, 0x5, 0x8, 0x0, 0x800}, 0x0, 0x8, r0, 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000100)) r5 = getpgid(0x0) syz_open_procfs(r5, &(0x7f0000000080)='cpuset\x00') dup2(r2, r3) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:10:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) 00:10:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x0, 0x420}, {r2}], 0x2, 0x9) 00:10:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x0, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x2, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1111.532398] journal_path: not usable as path [ 1111.532914] EXT4-fs: error: could not find journal device path [ 1111.535410] journal_path: not usable as path [ 1111.535793] EXT4-fs: error: could not find journal device path 00:10:02 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x24, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1111.587789] FAULT_INJECTION: forcing a failure. [ 1111.587789] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.589223] CPU: 1 UID: 0 PID: 9008 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1111.589245] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1111.589254] Call Trace: [ 1111.589260] [ 1111.589266] dump_stack_lvl+0xfa/0x120 [ 1111.589289] should_fail_ex+0x4d7/0x5e0 [ 1111.589318] should_failslab+0xc2/0x120 [ 1111.589335] __kmalloc_cache_noprof+0x73/0x470 [ 1111.589356] ? __pfx_find_ucounts+0x10/0x10 [ 1111.589381] ? alloc_ucounts+0x13e/0x450 [ 1111.589403] ? __asan_memcpy+0x3d/0x60 [ 1111.589429] ? alloc_ucounts+0x13e/0x450 [ 1111.589450] alloc_ucounts+0x13e/0x450 [ 1111.589471] ? key_put+0x16/0x2c0 [ 1111.589492] ? __pfx_alloc_ucounts+0x10/0x10 [ 1111.589515] ? create_user_ns+0x143/0xdd0 [ 1111.589539] copy_creds+0x56e/0xa20 [ 1111.589558] copy_process+0xf5a/0x73e0 [ 1111.589583] ? __pfx__kstrtoull+0x10/0x10 [ 1111.589617] ? __pfx_copy_process+0x10/0x10 [ 1111.589641] ? __might_fault+0xe0/0x190 [ 1111.589665] ? _copy_from_user+0x5b/0xd0 [ 1111.589690] kernel_clone+0xea/0x820 [ 1111.589714] ? get_pid_task+0xfd/0x250 [ 1111.589739] ? __pfx_kernel_clone+0x10/0x10 [ 1111.589769] ? find_held_lock+0x2b/0x80 [ 1111.589791] ? ksys_write+0x121/0x240 [ 1111.589821] ? lock_is_held_type+0x9e/0x120 [ 1111.589849] __do_sys_clone3+0x1f5/0x280 [ 1111.589863] ? __pfx___do_sys_clone3+0x10/0x10 [ 1111.589889] ? __fget_files+0x20d/0x3b0 [ 1111.589916] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1111.589940] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1111.589965] ? ksys_write+0x1a3/0x240 [ 1111.589988] ? __pfx_ksys_write+0x10/0x10 [ 1111.590018] do_syscall_64+0xbf/0x360 [ 1111.590036] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1111.590052] RIP: 0033:0x7f752ccf6b19 [ 1111.590065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1111.590080] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1111.590096] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1111.590107] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1111.590116] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1111.590126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1111.590135] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1111.590156] [ 1111.603558] journal_path: not usable as path [ 1111.609415] EXT4-fs: error: could not find journal device path 00:10:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x0, 0x2004}, {r2}], 0x2, 0x9) 00:10:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) r3 = openat$incfs(r2, &(0x7f00000000c0)='.log\x00', 0x101600, 0x31) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/126, 0x7e, 0x0, &(0x7f0000000240)=""/189, 0xbd}, &(0x7f0000000300)=0x40) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x6b26) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1111.642319] journal_path: not usable as path [ 1111.642703] EXT4-fs: error: could not find journal device path 00:10:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x0, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x3, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:10:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x0, 0x4000}, {r2}], 0x2, 0x9) 00:10:11 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:10:11 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:11 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x9, 0x7f, 0xff, 0x85, 0x0, 0x9, 0x40, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x2}, 0x28b2, 0x2, 0x445e, 0x5, 0xca, 0x12a, 0x200, 0x0, 0x2, 0x0, 0x7}, r3, 0x2, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}, 0x1c) 00:10:11 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x4, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:10:11 executing program 7: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) [ 1120.340563] journal_path: not usable as path [ 1120.341097] EXT4-fs: error: could not find journal device path [ 1120.343052] journal_path: not usable as path [ 1120.343439] EXT4-fs: error: could not find journal device path 00:10:11 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:10:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1, 0x0, 0x6400}, {r2}], 0x2, 0x9) 00:10:11 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:11 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x3, 0x7ff}, @timestamp, @window={0x3, 0x0, 0x8}, @sack_perm, @timestamp, @sack_perm, @window={0x3, 0xdf, 0x1}, @window={0x3, 0x1, 0x6}], 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1120.457633] journal_path: not usable as path [ 1120.458079] EXT4-fs: error: could not find journal device path 00:10:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) [ 1120.480043] journal_path: not usable as path [ 1120.480490] EXT4-fs: error: could not find journal device path 00:10:11 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:11 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:10:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:11 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:11 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1120.601404] journal_path: not usable as path [ 1120.602066] EXT4-fs: error: could not find journal device path [ 1120.607335] journal_path: not usable as path [ 1120.607707] EXT4-fs: error: could not find journal device path [ 1120.622013] FAULT_INJECTION: forcing a failure. [ 1120.622013] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.623701] CPU: 1 UID: 0 PID: 9080 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1120.623730] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1120.623744] Call Trace: [ 1120.623752] [ 1120.623762] dump_stack_lvl+0xfa/0x120 [ 1120.623791] should_fail_ex+0x4d7/0x5e0 [ 1120.623834] ? dup_fd+0x4d/0xa80 [ 1120.623864] should_failslab+0xc2/0x120 [ 1120.623886] kmem_cache_alloc_noprof+0x5f/0x470 [ 1120.623914] ? __pfx_avc_has_perm+0x10/0x10 [ 1120.623946] dup_fd+0x4d/0xa80 [ 1120.623981] copy_process+0x21b5/0x73e0 [ 1120.624015] ? __pfx__kstrtoull+0x10/0x10 [ 1120.624059] ? __pfx_copy_process+0x10/0x10 [ 1120.624092] ? __might_fault+0xe0/0x190 [ 1120.624120] ? _copy_from_user+0x5b/0xd0 [ 1120.624150] kernel_clone+0xea/0x820 [ 1120.624181] ? get_pid_task+0xfd/0x250 [ 1120.624214] ? __pfx_kernel_clone+0x10/0x10 [ 1120.624254] ? find_held_lock+0x2b/0x80 [ 1120.624285] ? ksys_write+0x121/0x240 [ 1120.624316] ? lock_is_held_type+0x9e/0x120 [ 1120.624352] __do_sys_clone3+0x1f5/0x280 [ 1120.624372] ? __pfx___do_sys_clone3+0x10/0x10 [ 1120.624406] ? __fget_files+0x20d/0x3b0 [ 1120.624441] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1120.624474] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1120.624508] ? ksys_write+0x1a3/0x240 [ 1120.624538] ? __pfx_ksys_write+0x10/0x10 [ 1120.624578] do_syscall_64+0xbf/0x360 [ 1120.624602] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1120.624623] RIP: 0033:0x7f752ccf6b19 [ 1120.624640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1120.624661] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1120.624682] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1120.624697] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1120.624712] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1120.624726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1120.624741] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1120.624770] 00:10:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) 00:10:21 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3}, 0x1c) 00:10:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:10:21 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:10:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x6, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:10:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1129.986601] journal_path: not usable as path [ 1129.987475] EXT4-fs: error: could not find journal device path [ 1129.995135] journal_path: not usable as path [ 1129.995850] EXT4-fs: error: could not find journal device path 00:10:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) 00:10:21 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x80c, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1130.181162] journal_path: not usable as path [ 1130.182042] EXT4-fs: error: could not find journal device path [ 1130.185721] journal_path: not usable as path [ 1130.186717] EXT4-fs: error: could not find journal device path 00:10:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x7, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:10:31 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x90c, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:10:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) 00:10:31 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x30, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x7fffffff, 0x7, 0x8, 0xfb6]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000010}, 0x808) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x101, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:10:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x8}], 0x2, 0x9) 00:10:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1140.236953] journal_path: not usable as path [ 1140.237441] EXT4-fs: error: could not find journal device path [ 1140.243066] journal_path: not usable as path [ 1140.243535] EXT4-fs: error: could not find journal device path 00:10:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x8, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:10:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:31 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xc08, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:10:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) 00:10:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x64}], 0x2, 0x9) 00:10:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000080)=0xffffffff, 0x4) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:10:31 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1140.359639] FAULT_INJECTION: forcing a failure. [ 1140.359639] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.360685] CPU: 1 UID: 0 PID: 9148 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1140.360702] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1140.360710] Call Trace: [ 1140.360714] [ 1140.360719] dump_stack_lvl+0xfa/0x120 [ 1140.360740] should_fail_ex+0x4d7/0x5e0 [ 1140.360765] should_failslab+0xc2/0x120 [ 1140.360778] __kvmalloc_node_noprof+0x10d/0x590 [ 1140.360797] ? alloc_fdtable+0xed/0x2c0 [ 1140.360821] ? alloc_fdtable+0xed/0x2c0 [ 1140.360835] alloc_fdtable+0xed/0x2c0 [ 1140.360851] dup_fd+0x6ef/0xa80 [ 1140.360870] copy_process+0x21b5/0x73e0 [ 1140.360890] ? __pfx__kstrtoull+0x10/0x10 [ 1140.360914] ? __pfx_copy_process+0x10/0x10 [ 1140.360933] ? __might_fault+0xe0/0x190 [ 1140.360948] ? _copy_from_user+0x5b/0xd0 [ 1140.360965] kernel_clone+0xea/0x820 [ 1140.360982] ? get_pid_task+0xfd/0x250 [ 1140.361002] ? __pfx_kernel_clone+0x10/0x10 [ 1140.361023] ? find_held_lock+0x2b/0x80 [ 1140.361041] ? ksys_write+0x121/0x240 [ 1140.361059] ? lock_is_held_type+0x9e/0x120 [ 1140.361080] __do_sys_clone3+0x1f5/0x280 [ 1140.361091] ? __pfx___do_sys_clone3+0x10/0x10 [ 1140.361109] ? __fget_files+0x20d/0x3b0 [ 1140.361128] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1140.361147] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1140.361165] ? ksys_write+0x1a3/0x240 [ 1140.361181] ? __pfx_ksys_write+0x10/0x10 [ 1140.361203] do_syscall_64+0xbf/0x360 [ 1140.361217] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1140.361230] RIP: 0033:0x7f752ccf6b19 [ 1140.361239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1140.361251] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1140.361263] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1140.361271] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1140.361278] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1140.361286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1140.361293] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1140.361309] [ 1140.380602] journal_path: not usable as path [ 1140.381015] EXT4-fs: error: could not find journal device path [ 1140.383637] journal_path: not usable as path [ 1140.384057] EXT4-fs: error: could not find journal device path 00:10:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x9, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:10:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) 00:10:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:31 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xc09, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1140.502229] journal_path: not usable as path [ 1140.502657] EXT4-fs: error: could not find journal device path [ 1140.527043] journal_path: not usable as path [ 1140.527486] EXT4-fs: error: could not find journal device path 00:10:41 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:10:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x420}], 0x2, 0x9) 00:10:41 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xf, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:10:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) 00:10:41 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:41 executing program 3: fstatfs(0xffffffffffffffff, &(0x7f00000001c0)=""/131) perf_event_open(&(0x7f0000000140)={0x2, 0xb5, 0xf1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff7c, 0x100000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x8, 0x5, 0x40, 0x5, 0x0, 0x0, 0x80000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6e9, 0x4, @perf_config_ext={0x400, 0x4}, 0x802, 0x2, 0x200, 0x2, 0x40000000, 0x7, 0xfff, 0x0, 0x800, 0x0, 0x80000001}, r2, 0x3, 0xffffffffffffffff, 0xa) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:10:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) 00:10:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1150.406241] journal_path: not usable as path [ 1150.407039] EXT4-fs: error: could not find journal device path [ 1150.427769] journal_path: not usable as path [ 1150.428542] EXT4-fs: error: could not find journal device path 00:10:41 executing program 3: r0 = getpid() pidfd_open(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x3, 0x3, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x20}, r0, 0x4, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @private1}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='veth1_to_hsr\x00', 0x10) 00:10:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) 00:10:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:41 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:41 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xf0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:10:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x2004}], 0x2, 0x9) 00:10:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) 00:10:41 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x1300, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:10:41 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) [ 1150.651093] FAULT_INJECTION: forcing a failure. [ 1150.651093] name failslab, interval 1, probability 0, space 0, times 0 [ 1150.652663] CPU: 0 UID: 0 PID: 9207 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1150.652689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1150.652701] Call Trace: [ 1150.652707] [ 1150.652715] dump_stack_lvl+0xfa/0x120 [ 1150.652742] should_fail_ex+0x4d7/0x5e0 [ 1150.652776] should_failslab+0xc2/0x120 [ 1150.652796] __kvmalloc_node_noprof+0x10d/0x590 [ 1150.652830] ? alloc_fdtable+0x159/0x2c0 [ 1150.652861] ? alloc_fdtable+0x159/0x2c0 [ 1150.652884] alloc_fdtable+0x159/0x2c0 [ 1150.652910] dup_fd+0x6ef/0xa80 [ 1150.652942] copy_process+0x21b5/0x73e0 [ 1150.652972] ? __pfx__kstrtoull+0x10/0x10 [ 1150.653011] ? __pfx_copy_process+0x10/0x10 [ 1150.653041] ? __might_fault+0xe0/0x190 [ 1150.653066] ? _copy_from_user+0x5b/0xd0 [ 1150.653092] kernel_clone+0xea/0x820 [ 1150.653121] ? get_pid_task+0xfd/0x250 [ 1150.653151] ? __pfx_kernel_clone+0x10/0x10 [ 1150.653187] ? find_held_lock+0x2b/0x80 [ 1150.653213] ? ksys_write+0x121/0x240 [ 1150.653242] ? lock_is_held_type+0x9e/0x120 [ 1150.653274] __do_sys_clone3+0x1f5/0x280 [ 1150.653291] ? __pfx___do_sys_clone3+0x10/0x10 [ 1150.653331] ? perf_trace_preemptirq_template+0x259/0x430 00:10:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x4000}], 0x2, 0x9) [ 1150.653364] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1150.653392] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1150.653424] ? __pfx_ksys_write+0x10/0x10 [ 1150.653459] do_syscall_64+0xbf/0x360 [ 1150.653481] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1150.653501] RIP: 0033:0x7f752ccf6b19 [ 1150.653515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1150.653534] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1150.653553] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1150.653568] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1150.653581] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1150.653593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1150.653604] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1150.653629] [ 1150.691927] journal_path: not usable as path [ 1150.692537] EXT4-fs: error: could not find journal device path [ 1150.702758] journal_path: not usable as path [ 1150.703402] EXT4-fs: error: could not find journal device path 00:10:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}], 0x3, 0x9) 00:10:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x209, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:10:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x6400}], 0x2, 0x9) 00:10:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) 00:10:51 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:10:51 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:10:51 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) 00:10:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') dup2(0xffffffffffffffff, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1160.187080] journal_path: not usable as path [ 1160.187903] EXT4-fs: error: could not find journal device path 00:10:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) [ 1160.210697] journal_path: not usable as path [ 1160.212049] EXT4-fs: error: could not find journal device path [ 1160.291728] FAULT_INJECTION: forcing a failure. [ 1160.291728] name failslab, interval 1, probability 0, space 0, times 0 [ 1160.293659] CPU: 1 UID: 0 PID: 9244 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1160.293689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1160.293702] Call Trace: [ 1160.293709] [ 1160.293717] dump_stack_lvl+0xfa/0x120 [ 1160.293747] should_fail_ex+0x4d7/0x5e0 [ 1160.293784] ? copy_fs_struct+0x49/0x350 [ 1160.293804] should_failslab+0xc2/0x120 [ 1160.293834] kmem_cache_alloc_noprof+0x5f/0x470 [ 1160.293863] ? do_raw_spin_unlock+0x53/0x220 [ 1160.293890] ? __asan_memset+0x24/0x50 [ 1160.293927] copy_fs_struct+0x49/0x350 [ 1160.293950] copy_process+0x302d/0x73e0 [ 1160.293984] ? __pfx__kstrtoull+0x10/0x10 [ 1160.294028] ? __pfx_copy_process+0x10/0x10 [ 1160.294062] ? __might_fault+0xe0/0x190 [ 1160.294090] ? _copy_from_user+0x5b/0xd0 [ 1160.294120] kernel_clone+0xea/0x820 [ 1160.294152] ? get_pid_task+0xfd/0x250 [ 1160.294185] ? __pfx_kernel_clone+0x10/0x10 [ 1160.294225] ? find_held_lock+0x2b/0x80 [ 1160.294255] ? ksys_write+0x121/0x240 [ 1160.294287] ? lock_is_held_type+0x9e/0x120 [ 1160.294324] __do_sys_clone3+0x1f5/0x280 [ 1160.294343] ? __pfx___do_sys_clone3+0x10/0x10 [ 1160.294378] ? __fget_files+0x20d/0x3b0 [ 1160.294414] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1160.294447] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1160.294481] ? ksys_write+0x1a3/0x240 [ 1160.294512] ? __pfx_ksys_write+0x10/0x10 [ 1160.294552] do_syscall_64+0xbf/0x360 [ 1160.294576] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1160.294597] RIP: 0033:0x7f752ccf6b19 [ 1160.294615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1160.294635] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1160.294657] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1160.294671] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1160.294684] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1160.294698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1160.294710] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1160.294739] 00:11:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 00:11:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:11:00 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:11:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) 00:11:00 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:11:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}], 0x2, 0x9) 00:11:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x300, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1169.594438] journal_path: not usable as path [ 1169.594855] EXT4-fs: error: could not find journal device path [ 1169.599570] journal_path: not usable as path [ 1169.600071] EXT4-fs: error: could not find journal device path 00:11:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) r3 = fsmount(r2, 0x1, 0x80) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000002c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/40, 0x28, 0x0, &(0x7f0000000200)=""/160, 0xa0}, &(0x7f0000000300)=0x40) r4 = getpid() getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xfffffffffffffff8) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) pidfd_open(r4, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000080)={0x0, 0x1, 0xffff, 0xffffffffffff8001, r4}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r5) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) bind$unix(r5, &(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e) 00:11:00 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x2400, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:11:00 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:11:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}], 0x3, 0x9) [ 1169.669282] journal_path: not usable as path [ 1169.669685] EXT4-fs: error: could not find journal device path [ 1169.675739] journal_path: not usable as path [ 1169.676134] EXT4-fs: error: could not find journal device path 00:11:00 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:11:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) 00:11:01 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}], 0x3, 0x9) 00:11:01 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:11:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x0, 0x8}], 0x2, 0x9) 00:11:01 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x500, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1169.797659] journal_path: not usable as path [ 1169.798171] EXT4-fs: error: could not find journal device path [ 1169.799990] journal_path: not usable as path [ 1169.800357] EXT4-fs: error: could not find journal device path 00:11:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}], 0x2, 0x9) 00:11:01 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x80000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:11:01 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3, 0xf9, 0xc5, 0xff, 0x0, 0x84fc, 0x20080, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x7, @perf_config_ext={0x1, 0x4916ae04}, 0x0, 0x401, 0x24e, 0x8, 0x4, 0x1ff, 0xfff7, 0x0, 0x400, 0x0, 0x9}, 0x0, 0x9, r0, 0x1) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r3 = getpid() perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x0, 0x20, 0x33, 0x0, 0x713, 0x4, 0x7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x100000001, 0xffffffffffff0000}, 0x2, 0x1, 0x7, 0x1, 0x3, 0x9, 0x8001, 0x0, 0x8000, 0x0, 0xf38}, r3, 0x0, r1, 0x8) dup2(r0, r0) 00:11:01 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1169.892389] FAULT_INJECTION: forcing a failure. [ 1169.892389] name failslab, interval 1, probability 0, space 0, times 0 [ 1169.894306] CPU: 0 UID: 0 PID: 9289 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1169.894339] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1169.894353] Call Trace: [ 1169.894362] [ 1169.894371] dump_stack_lvl+0xfa/0x120 [ 1169.894404] should_fail_ex+0x4d7/0x5e0 [ 1169.894448] ? copy_process+0x2316/0x73e0 [ 1169.894484] should_failslab+0xc2/0x120 [ 1169.894507] kmem_cache_alloc_noprof+0x5f/0x470 [ 1169.894539] ? do_raw_spin_unlock+0x53/0x220 [ 1169.894571] ? _raw_spin_unlock+0x1e/0x40 [ 1169.894603] ? copy_fs_struct+0x2ab/0x350 [ 1169.894629] copy_process+0x2316/0x73e0 [ 1169.894664] ? __pfx__kstrtoull+0x10/0x10 [ 1169.894712] ? __pfx_copy_process+0x10/0x10 [ 1169.894747] ? __might_fault+0xe0/0x190 [ 1169.894777] ? _copy_from_user+0x5b/0xd0 [ 1169.894819] kernel_clone+0xea/0x820 [ 1169.894853] ? get_pid_task+0xfd/0x250 [ 1169.894889] ? __pfx_kernel_clone+0x10/0x10 [ 1169.894932] ? find_held_lock+0x2b/0x80 [ 1169.894964] ? ksys_write+0x121/0x240 [ 1169.894998] ? lock_is_held_type+0x9e/0x120 [ 1169.895039] __do_sys_clone3+0x1f5/0x280 [ 1169.895059] ? __pfx___do_sys_clone3+0x10/0x10 [ 1169.895100] ? perf_trace_preemptirq_template+0x259/0x430 [ 1169.895140] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1169.895174] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1169.895213] ? __pfx_ksys_write+0x10/0x10 [ 1169.895275] do_syscall_64+0xbf/0x360 [ 1169.895302] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1169.895326] RIP: 0033:0x7f752ccf6b19 [ 1169.895344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1169.895367] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1169.895390] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1169.895406] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1169.895421] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1169.895435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1169.895449] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1169.895480] [ 1169.906316] journal_path: not usable as path [ 1169.918076] EXT4-fs: error: could not find journal device path [ 1169.956829] journal_path: not usable as path [ 1169.957245] EXT4-fs: error: could not find journal device path 00:11:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}], 0x3, 0x9) 00:11:09 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x600, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:11:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), r0) sendmsg$NL80211_CMD_SET_CHANNEL(r1, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x40, r2, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xda6, 0x62}}}}, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004004}, 0x90) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) sendmsg$NFT_MSG_GETFLOWTABLE(r3, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x224, 0x17, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1d0, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'macvlan0\x00'}, {0x14, 0x1, 'veth1_to_team\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'ipvlan1\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'veth0_to_bond\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bridge0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x101}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'erspan0\x00'}, {0x14, 0x1, 'netdevsim0\x00'}, {0x14, 0x1, 'syzkaller1\x00'}, {0x14, 0x1, 'team0\x00'}, {0x14, 0x1, 'veth1\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bridge_slave_1\x00'}, {0x14, 0x1, 'vxcan1\x00'}, {0x14, 0x1, 'vxcan1\x00'}, {0x14, 0x1, 'bond0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'bridge_slave_0\x00'}, {0x14, 0x1, 'batadv0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x826d}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}]}, 0x224}, 0x1, 0x0, 0x0, 0x24000800}, 0x4008000) r5 = fsmount(r3, 0x1, 0x8) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:11:09 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:11:09 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xe0ffff, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:11:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) 00:11:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x0, 0x64}], 0x2, 0x9) 00:11:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}], 0x2, 0x9) [ 1178.225132] journal_path: not usable as path [ 1178.226090] EXT4-fs: error: could not find journal device path 00:11:09 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x700, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1178.246774] journal_path: not usable as path [ 1178.248152] EXT4-fs: error: could not find journal device path 00:11:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:11:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {}], 0x4, 0x9) 00:11:09 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:11:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) 00:11:09 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) io_submit(0x0, 0x7, &(0x7f0000002680)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x3, 0xffffffffffffffff, &(0x7f0000000080)="c4179eacf1172f37310676e2a376f1dafb9f738f350f6f4369ac42fd2d2251", 0x1f, 0x20, 0x0, 0x2}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3, r0, &(0x7f00000001c0)="af07dc42dfa03c815d048af14257ee2b52daf33d3bb6f41a03ad3d1946c21d9a85e2678641b5e21cf3472ce8d2b4b1faa91eed75b722f60ef545999d6272add2693c8c371f939ca11924e67af11f4e448866195d66d33f438b5a0effd83422df1e75114117abe7c8fe3e0739dd8a40a0595ca9a24772e93eb8552738fb8b6215e5002501712a980a52ee7910d8ca071a4b6c2971dae8ca14f09387b5b1a6a10e3ce569654e902afde8f8e9e641812fc9eb04115c66ef38b9f5ddb34adde1e022b13bb2321504c7b6de1eda044a52982e237b8b234e77e4960e0f908a1d27baf7584d47e51e", 0xe5, 0x3, 0x0, 0x2, r1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000300)="b5e493a7708daeeb6a235902c555ff4347b7e0caab9871c00657a98ba69e5f81bb53560e3bc939c5495a648011d7a82ce0d4a46581d3336694d05b1f969eb98ee2d09905b63a832319e1dec96738efb8b484b7040abfff75abe828a274dbc69d62b017285c0a6bf28fa25599b68e670f99d57cbfd7636026df56568dc646d97f94a880bb1ceec1d63602542b48e34c0581a9181df2ee95acd975c59c8b5a5dc351336260916ffaebb4c055a576cf5923eb48dea71db88d8eed628b407531784b406a8220041738b0645df553e35cd3", 0xcf, 0x1, 0x0, 0x3, r1}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x6, 0xba, r1, &(0x7f0000000440)="5fef1f8f4259067867feadcb3ef29f6fe185747b2789ec32933a87736e61d6aad6a8beb5624dc6cff3a0519fb7d6edef39ef021e020385cbddadc7d855171ba619577f07808b5c239447e43a15d9cc99cf8ea1898d2d0183b17b4dc06b24b03a41389888ad0b2436b7938bcaacf1c06ef824c3acb2c52febc00f61a904e9f1cd0b78fdb31e77740a4bb13885fc0f8c9eb5e558a5bf7cb9c83b98b0150bcbc71458bd07e5bdb1f373798c6bb31edf10eb5c3679f0bad94efabe6b78d3d5924a0d475a6e39f3ee9ee0e61629b6cc8e9050905b71e2b5255e16a28b16787142dbadb90e6a272a7536bf5afea73f28ff4f8e2e1f2df6", 0xf4, 0x4, 0x0, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x2, 0x1, r0, &(0x7f0000000580)="2c18e4fc428d37", 0x7, 0x9, 0x0, 0x1, r1}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x3, 0x1, r1, &(0x7f0000000600)="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", 0x1000, 0x8, 0x0, 0x3}, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x53c8, r3, &(0x7f0000001640)="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", 0x1000, 0x3, 0x0, 0x1, r1}]) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1178.400385] FAULT_INJECTION: forcing a failure. [ 1178.400385] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.402262] CPU: 0 UID: 0 PID: 9338 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1178.402295] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.402308] Call Trace: [ 1178.402316] [ 1178.402325] dump_stack_lvl+0xfa/0x120 [ 1178.402355] should_fail_ex+0x4d7/0x5e0 [ 1178.402395] ? copy_process+0x66d1/0x73e0 [ 1178.402430] should_failslab+0xc2/0x120 [ 1178.402454] kmem_cache_alloc_noprof+0x5f/0x470 [ 1178.402494] copy_process+0x66d1/0x73e0 [ 1178.402529] ? __pfx__kstrtoull+0x10/0x10 [ 1178.402576] ? __pfx_copy_process+0x10/0x10 [ 1178.402611] ? __might_fault+0xe0/0x190 [ 1178.402641] ? _copy_from_user+0x5b/0xd0 [ 1178.402673] kernel_clone+0xea/0x820 [ 1178.402707] ? get_pid_task+0xfd/0x250 [ 1178.402742] ? __pfx_kernel_clone+0x10/0x10 [ 1178.402785] ? find_held_lock+0x2b/0x80 [ 1178.402825] ? ksys_write+0x121/0x240 [ 1178.402859] ? lock_is_held_type+0x9e/0x120 [ 1178.402898] __do_sys_clone3+0x1f5/0x280 [ 1178.402919] ? __pfx___do_sys_clone3+0x10/0x10 [ 1178.402960] ? perf_trace_preemptirq_template+0x259/0x430 [ 1178.403000] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1178.403034] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1178.403072] ? __pfx_ksys_write+0x10/0x10 [ 1178.403115] do_syscall_64+0xbf/0x360 [ 1178.403140] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1178.403164] RIP: 0033:0x7f752ccf6b19 [ 1178.403182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.403204] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1178.403227] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1178.403243] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1178.403257] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1178.403271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1178.403285] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1178.403315] 00:11:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x900, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:11:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x0, 0x420}], 0x2, 0x9) 00:11:18 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x3c, r2, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x14}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7f}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x718}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x29800}, 0x4008045) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:11:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) 00:11:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {}], 0x4, 0x9) 00:11:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:11:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:11:18 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1187.545842] journal_path: not usable as path [ 1187.546284] EXT4-fs: error: could not find journal device path [ 1187.549171] journal_path: not usable as path [ 1187.549551] EXT4-fs: error: could not find journal device path 00:11:18 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:11:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:11:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {}], 0x4, 0x9) 00:11:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) [ 1187.656757] journal_path: not usable as path [ 1187.657333] EXT4-fs: error: could not find journal device path [ 1187.661081] journal_path: not usable as path [ 1187.661456] EXT4-fs: error: could not find journal device path 00:11:18 executing program 3: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/92) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x9, 0x1, 0x9, 0x0, 0x0, 0x7, 0x4400, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xbbc9, 0x4, @perf_config_ext={0x155c, 0x1}, 0x50000, 0x5e, 0x8, 0x0, 0x9, 0x40, 0x7fff, 0x0, 0x2, 0x0, 0x30}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x9) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x9, 0x0, 0x40, 0x3, 0x0, 0x200, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x3, 0x10001}, 0x20c0, 0x9, 0x7f, 0x0, 0x80, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x7ff}, 0x0, 0x0, r1, 0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='auxv\x00') perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x7, 0x1, 0x7f, 0x3f, 0x0, 0x100000000, 0x22200, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2739, 0x1, @perf_config_ext={0x6, 0xffffffffffffff08}, 0x2, 0x8, 0x3a, 0x7, 0x5, 0xd3b, 0x80, 0x0, 0x7, 0x0, 0x8}, 0xffffffffffffffff, 0x6, r3, 0x3) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) writev(r4, &(0x7f0000005a80)=[{&(0x7f0000004700)="dc", 0x1}], 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e24, 0x2, @loopback, 0x3}, 0x1c) 00:11:18 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:11:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:11:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 33) 00:11:19 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x902, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:11:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x0, 0x2004}], 0x2, 0x9) [ 1187.778620] journal_path: not usable as path [ 1187.779465] EXT4-fs: error: could not find journal device path [ 1187.800366] journal_path: not usable as path [ 1187.801192] EXT4-fs: error: could not find journal device path [ 1187.821494] FAULT_INJECTION: forcing a failure. [ 1187.821494] name failslab, interval 1, probability 0, space 0, times 0 [ 1187.823326] CPU: 0 UID: 0 PID: 9386 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1187.823358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1187.823372] Call Trace: [ 1187.823380] [ 1187.823389] dump_stack_lvl+0xfa/0x120 [ 1187.823420] should_fail_ex+0x4d7/0x5e0 [ 1187.823460] ? create_new_namespaces+0x30/0xab0 [ 1187.823490] should_failslab+0xc2/0x120 [ 1187.823513] kmem_cache_alloc_noprof+0x5f/0x470 [ 1187.823554] create_new_namespaces+0x30/0xab0 [ 1187.823584] ? security_capable+0x2f/0x90 [ 1187.823623] copy_namespaces+0x45c/0x580 [ 1187.823655] copy_process+0x26d5/0x73e0 [ 1187.823691] ? __pfx__kstrtoull+0x10/0x10 [ 1187.823739] ? __pfx_copy_process+0x10/0x10 [ 1187.823775] ? __might_fault+0xe0/0x190 [ 1187.823812] ? _copy_from_user+0x5b/0xd0 [ 1187.823845] kernel_clone+0xea/0x820 [ 1187.823892] ? get_pid_task+0xfd/0x250 [ 1187.823927] ? __pfx_kernel_clone+0x10/0x10 [ 1187.823970] ? find_held_lock+0x2b/0x80 [ 1187.824002] ? ksys_write+0x121/0x240 [ 1187.824036] ? lock_is_held_type+0x9e/0x120 [ 1187.824076] __do_sys_clone3+0x1f5/0x280 [ 1187.824097] ? __pfx___do_sys_clone3+0x10/0x10 [ 1187.824137] ? perf_trace_preemptirq_template+0x259/0x430 [ 1187.824180] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1187.824225] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1187.824278] ? __pfx_ksys_write+0x10/0x10 [ 1187.824321] do_syscall_64+0xbf/0x360 [ 1187.824346] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1187.824370] RIP: 0033:0x7f752ccf6b19 [ 1187.824388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1187.824411] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1187.824434] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1187.824450] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1187.824464] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1187.824478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1187.824492] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1187.824523] [ 1190.383319] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 1190.386096] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 1190.389182] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 1190.397792] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 1190.401114] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 1192.479972] Bluetooth: hci5: command tx timeout [ 1194.528433] Bluetooth: hci5: command tx timeout [ 1196.576276] Bluetooth: hci5: command tx timeout [ 1198.623607] Bluetooth: hci5: command tx timeout [ 1207.833798] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1207.835249] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1207.901670] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1207.903273] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 00:11:48 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xf00, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:11:48 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) 00:11:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x0, 0x4000}], 0x2, 0x9) 00:11:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0}], 0x3, 0x9) 00:11:48 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:11:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x42608, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e24, 0xfe0e, @mcast2, 0x5}, 0x1c) 00:11:48 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:11:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 34) [ 1217.404634] journal_path: not usable as path [ 1217.405157] EXT4-fs: error: could not find journal device path [ 1217.408292] journal_path: not usable as path [ 1217.408714] EXT4-fs: error: could not find journal device path 00:11:48 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:11:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0}], 0x2, 0x9) 00:11:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x0, 0x6400}], 0x2, 0x9) 00:11:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 35) [ 1217.510548] journal_path: not usable as path [ 1217.511140] EXT4-fs: error: could not find journal device path [ 1217.518342] journal_path: not usable as path [ 1217.518777] EXT4-fs: error: could not find journal device path 00:11:48 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:11:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1217.544644] FAULT_INJECTION: forcing a failure. [ 1217.544644] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.545863] CPU: 0 UID: 0 PID: 9888 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1217.545880] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1217.545888] Call Trace: [ 1217.545892] [ 1217.545897] dump_stack_lvl+0xfa/0x120 [ 1217.545917] should_fail_ex+0x4d7/0x5e0 [ 1217.545943] ? copy_pid_ns+0x2c3/0xd20 [ 1217.545958] should_failslab+0xc2/0x120 [ 1217.545971] kmem_cache_alloc_noprof+0x5f/0x470 [ 1217.545992] copy_pid_ns+0x2c3/0xd20 [ 1217.546007] ? __pfx_copy_pid_ns+0x10/0x10 [ 1217.546023] ? __create_object+0x59/0x80 [ 1217.546038] ? copy_mnt_ns+0xac/0xab0 [ 1217.546057] ? kmem_cache_alloc_noprof+0x352/0x470 [ 1217.546074] ? copy_ipcs+0xb7/0x630 [ 1217.546091] create_new_namespaces+0x2b2/0xab0 [ 1217.546111] copy_namespaces+0x45c/0x580 [ 1217.546127] copy_process+0x26d5/0x73e0 [ 1217.546146] ? __pfx__kstrtoull+0x10/0x10 [ 1217.546171] ? __pfx_copy_process+0x10/0x10 [ 1217.546189] ? __might_fault+0xe0/0x190 [ 1217.546204] ? _copy_from_user+0x5b/0xd0 [ 1217.546220] kernel_clone+0xea/0x820 [ 1217.546238] ? get_pid_task+0xfd/0x250 [ 1217.546256] ? __pfx_kernel_clone+0x10/0x10 [ 1217.546279] ? find_held_lock+0x2b/0x80 [ 1217.546296] ? ksys_write+0x121/0x240 [ 1217.546313] ? lock_is_held_type+0x9e/0x120 [ 1217.546334] __do_sys_clone3+0x1f5/0x280 [ 1217.546345] ? __pfx___do_sys_clone3+0x10/0x10 [ 1217.546365] ? perf_trace_preemptirq_template+0x259/0x430 [ 1217.546385] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1217.546403] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1217.546423] ? __pfx_ksys_write+0x10/0x10 [ 1217.546444] do_syscall_64+0xbf/0x360 [ 1217.546458] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1217.546470] RIP: 0033:0x7f752ccf6b19 [ 1217.546479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1217.546491] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1217.546503] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1217.546511] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1217.546518] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1217.546526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1217.546533] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1217.546549] 00:11:48 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xf000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:11:48 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) 00:11:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) 00:11:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 36) 00:11:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 37) 00:11:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) 00:11:58 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x7}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r2, 0x0, 0x0, 0x80800) dup2(r2, r0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xff, 0x8e, 0x7, 0xc2, 0x0, 0x9, 0x200, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff4a, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x7096, 0x401, 0x8, 0x2, 0x7f, 0x33, 0x40, 0x0, 0x8, 0x0, 0x20}, r3, 0x4, r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r5, 0x0, 0x0, 0x80800) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000280), &(0x7f00000002c0)=0xc) syncfs(r5) dup2(r4, r1) setsockopt$inet_udp_int(r5, 0x11, 0xb, &(0x7f0000000300)=0x4, 0x4) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0xa4100, 0x0) ioctl$BTRFS_IOC_DEFRAG(r6, 0x50009402, 0x0) r7 = syz_open_dev$vcsu(&(0x7f0000000080), 0x100000001, 0x4200) ioctl$TCSETAW(r7, 0x5407, &(0x7f00000000c0)={0x3, 0x40, 0x3, 0x8, 0x18, "ad52107ed68d0b06"}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000500)={'filter\x00', 0x0, 0x4, 0xad, [0x8000, 0x3, 0x1, 0x3ff, 0x2, 0x8b], 0xa, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000440)=""/173}, &(0x7f0000000580)=0x78) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:11:58 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:11:58 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x30000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:11:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = getpgrp(r0) r3 = getpid() pidfd_open(r3, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3, 0x4, 0x4, 0x1, 0x0, 0xfff, 0x181, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1b9, 0x0, @perf_config_ext={0x100000001, 0x40}, 0x1e8, 0x8001, 0x1000, 0x0, 0xffff, 0x800, 0x1, 0x0, 0x0, 0x0, 0x2}, r3, 0x1, r4, 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3, 0x7, 0x0, 0x81, 0x0, 0x81, 0x20, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xb87, 0x5}, 0x40200, 0x9, 0x1f, 0x4, 0x80000001, 0x8000, 0xffc1, 0x0, 0x5, 0x0, 0x7fff}, r2, 0xf, 0xffffffffffffffff, 0xa) pidfd_open(r2, 0x0) r7 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r7}], 0x2, 0x9) 00:11:58 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) 00:11:58 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1227.402189] journal_path: not usable as path [ 1227.402639] EXT4-fs: error: could not find journal device path [ 1227.407270] journal_path: not usable as path [ 1227.407652] EXT4-fs: error: could not find journal device path [ 1227.418719] FAULT_INJECTION: forcing a failure. [ 1227.418719] name failslab, interval 1, probability 0, space 0, times 0 [ 1227.420810] CPU: 1 UID: 0 PID: 9925 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1227.420846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1227.420862] Call Trace: [ 1227.420870] [ 1227.420881] dump_stack_lvl+0xfa/0x120 [ 1227.420917] should_fail_ex+0x4d7/0x5e0 [ 1227.420965] should_failslab+0xc2/0x120 [ 1227.420993] __kmalloc_node_track_caller_noprof+0xb8/0x490 [ 1227.421034] ? register_pidns_sysctls+0x4b/0x1c0 [ 1227.421068] kmemdup_noprof+0x2b/0x60 [ 1227.421109] register_pidns_sysctls+0x4b/0x1c0 [ 1227.421137] copy_pid_ns+0x54c/0xd20 [ 1227.421177] ? __pfx_copy_pid_ns+0x10/0x10 [ 1227.421211] ? __create_object+0x59/0x80 [ 1227.421243] ? copy_mnt_ns+0xac/0xab0 [ 1227.421283] ? kmem_cache_alloc_noprof+0x352/0x470 [ 1227.421321] ? copy_ipcs+0xb7/0x630 [ 1227.421357] create_new_namespaces+0x2b2/0xab0 [ 1227.421401] copy_namespaces+0x45c/0x580 00:11:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) [ 1227.421437] copy_process+0x26d5/0x73e0 [ 1227.421478] ? __pfx__kstrtoull+0x10/0x10 [ 1227.421531] ? __pfx_copy_process+0x10/0x10 [ 1227.421572] ? __might_fault+0xe0/0x190 [ 1227.421606] ? _copy_from_user+0x5b/0xd0 [ 1227.421643] kernel_clone+0xea/0x820 [ 1227.421681] ? get_pid_task+0xfd/0x250 [ 1227.421720] ? __pfx_kernel_clone+0x10/0x10 [ 1227.421770] ? find_held_lock+0x2b/0x80 [ 1227.421805] ? ksys_write+0x121/0x240 [ 1227.421844] ? lock_is_held_type+0x9e/0x120 [ 1227.421889] __do_sys_clone3+0x1f5/0x280 [ 1227.421912] ? __pfx___do_sys_clone3+0x10/0x10 [ 1227.421954] ? __fget_files+0x20d/0x3b0 [ 1227.421998] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1227.422038] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1227.422078] ? ksys_write+0x1a3/0x240 [ 1227.422115] ? __pfx_ksys_write+0x10/0x10 [ 1227.422162] do_syscall_64+0xbf/0x360 [ 1227.422192] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1227.422218] RIP: 0033:0x7f752ccf6b19 [ 1227.422238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1227.422265] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1227.422290] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1227.422308] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1227.422324] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1227.422341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1227.422357] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1227.422392] 00:12:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = getpgrp(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r4, 0x0, 0x0, 0x80800) kcmp(r0, r2, 0x1, r3, r4) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r5}], 0x2, 0x9) 00:12:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:12:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x9) 00:12:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7a50c83f2e27760, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e20, 0x9, @empty, 0xffff}}, 0x0, 0x0, 0x43, 0x0, "176c1d96d389b733fe93261883bd85048663a5f0fec5f98726503bd298c778816ac826e35495d7882f48c8c03d3a8b21ea9f111c41892e77cdd60d28cd2f72da0d3a743f8aac37e4997c320e4bea740e"}, 0xd8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r2 = syz_open_dev$mouse(&(0x7f0000000080), 0xd6, 0x9ac0) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 00:12:09 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x34000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:12:09 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:12:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 38) 00:12:09 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1238.302274] journal_path: not usable as path [ 1238.303165] EXT4-fs: error: could not find journal device path [ 1238.307982] journal_path: not usable as path [ 1238.308750] EXT4-fs: error: could not find journal device path [ 1238.340590] FAULT_INJECTION: forcing a failure. [ 1238.340590] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.342394] CPU: 0 UID: 0 PID: 9953 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1238.342424] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1238.342438] Call Trace: [ 1238.342445] [ 1238.342454] dump_stack_lvl+0xfa/0x120 [ 1238.342485] should_fail_ex+0x4d7/0x5e0 [ 1238.342528] should_failslab+0xc2/0x120 [ 1238.342552] __kmalloc_node_track_caller_noprof+0xb8/0x490 [ 1238.342588] ? register_pidns_sysctls+0x4b/0x1c0 [ 1238.342617] kmemdup_noprof+0x2b/0x60 [ 1238.342650] register_pidns_sysctls+0x4b/0x1c0 [ 1238.342674] copy_pid_ns+0x54c/0xd20 [ 1238.342706] ? __pfx_copy_pid_ns+0x10/0x10 [ 1238.342736] ? __create_object+0x59/0x80 [ 1238.342762] ? copy_mnt_ns+0xac/0xab0 [ 1238.342797] ? kmem_cache_alloc_noprof+0x352/0x470 [ 1238.342836] ? copy_ipcs+0xb7/0x630 [ 1238.342866] create_new_namespaces+0x2b2/0xab0 [ 1238.342902] copy_namespaces+0x45c/0x580 [ 1238.342933] copy_process+0x26d5/0x73e0 [ 1238.342967] ? __pfx__kstrtoull+0x10/0x10 [ 1238.343013] ? __pfx_copy_process+0x10/0x10 [ 1238.343046] ? __might_fault+0xe0/0x190 [ 1238.343076] ? _copy_from_user+0x5b/0xd0 [ 1238.343107] kernel_clone+0xea/0x820 [ 1238.343139] ? get_pid_task+0xfd/0x250 [ 1238.343172] ? __pfx_kernel_clone+0x10/0x10 [ 1238.343213] ? find_held_lock+0x2b/0x80 [ 1238.343244] ? ksys_write+0x121/0x240 [ 1238.343275] ? lock_is_held_type+0x9e/0x120 [ 1238.343313] __do_sys_clone3+0x1f5/0x280 [ 1238.343333] ? __pfx___do_sys_clone3+0x10/0x10 [ 1238.343371] ? perf_trace_preemptirq_template+0x259/0x430 [ 1238.343409] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1238.343441] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1238.343477] ? __pfx_ksys_write+0x10/0x10 [ 1238.343517] do_syscall_64+0xbf/0x360 [ 1238.343542] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1238.343565] RIP: 0033:0x7f752ccf6b19 [ 1238.343582] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1238.343604] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1238.343626] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1238.343641] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1238.343655] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1238.343669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1238.343682] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1238.343712] 00:12:09 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x80c0000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:12:09 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) 00:12:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r1, 0x0, 0x0, 0x80800) tee(r0, r1, 0x800, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:12:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x9) 00:12:09 executing program 4: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/186) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) getpid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xc489) r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x163}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) io_uring_register$IORING_REGISTER_PROBE(r3, 0x8, &(0x7f0000001800)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x25) process_vm_readv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/34, 0x22}], 0x1, &(0x7f0000001780)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/147, 0x93}, {&(0x7f00000012c0)=""/132, 0x84}, {&(0x7f0000001380)=""/157, 0x9d}, {&(0x7f0000001540)=""/225, 0xe1}, {&(0x7f0000001640)=""/73, 0x49}, {&(0x7f00000016c0)=""/186, 0xba}], 0x7, 0x0) poll(&(0x7f0000001480)=[{r2}, {r3}], 0x2, 0x9) 00:12:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:12:09 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x80000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1238.584357] journal_path: not usable as path [ 1238.585315] EXT4-fs: error: could not find journal device path 00:12:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 39) [ 1238.599642] journal_path: not usable as path [ 1238.600498] EXT4-fs: error: could not find journal device path [ 1238.685054] FAULT_INJECTION: forcing a failure. [ 1238.685054] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.686774] CPU: 1 UID: 0 PID: 9975 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1238.686809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1238.686822] Call Trace: [ 1238.686829] [ 1238.686838] dump_stack_lvl+0xfa/0x120 [ 1238.686868] should_fail_ex+0x4d7/0x5e0 [ 1238.686905] ? __register_sysctl_table+0xb5/0x16a0 [ 1238.686932] should_failslab+0xc2/0x120 [ 1238.686954] __kmalloc_noprof+0xb4/0x4b0 [ 1238.686991] __register_sysctl_table+0xb5/0x16a0 [ 1238.687015] ? kasan_save_track+0x14/0x30 [ 1238.687036] ? __kasan_kmalloc+0x7f/0x90 [ 1238.687061] ? __pfx___register_sysctl_table+0x10/0x10 [ 1238.687086] ? register_pidns_sysctls+0x4b/0x1c0 [ 1238.687111] ? __asan_memcpy+0x3d/0x60 [ 1238.687146] register_pidns_sysctls+0x119/0x1c0 [ 1238.687169] copy_pid_ns+0x54c/0xd20 [ 1238.687199] ? __pfx_copy_pid_ns+0x10/0x10 [ 1238.687227] ? __create_object+0x59/0x80 [ 1238.687253] ? copy_mnt_ns+0xac/0xab0 [ 1238.687286] ? kmem_cache_alloc_noprof+0x352/0x470 [ 1238.687318] ? copy_ipcs+0xb7/0x630 [ 1238.687347] create_new_namespaces+0x2b2/0xab0 [ 1238.687383] copy_namespaces+0x45c/0x580 [ 1238.687413] copy_process+0x26d5/0x73e0 [ 1238.687447] ? __pfx__kstrtoull+0x10/0x10 [ 1238.687497] ? __pfx_copy_process+0x10/0x10 [ 1238.687530] ? __might_fault+0xe0/0x190 [ 1238.687558] ? _copy_from_user+0x5b/0xd0 [ 1238.687589] kernel_clone+0xea/0x820 [ 1238.687620] ? get_pid_task+0xfd/0x250 [ 1238.687652] ? __pfx_kernel_clone+0x10/0x10 [ 1238.687692] ? find_held_lock+0x2b/0x80 [ 1238.687723] ? ksys_write+0x121/0x240 [ 1238.687753] ? lock_is_held_type+0x9e/0x120 [ 1238.687790] __do_sys_clone3+0x1f5/0x280 [ 1238.687810] ? __pfx___do_sys_clone3+0x10/0x10 [ 1238.687844] ? __fget_files+0x20d/0x3b0 [ 1238.687880] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1238.687913] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1238.687946] ? ksys_write+0x1a3/0x240 [ 1238.687977] ? __pfx_ksys_write+0x10/0x10 [ 1238.688016] do_syscall_64+0xbf/0x360 [ 1238.688040] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1238.688062] RIP: 0033:0x7f752ccf6b19 [ 1238.688079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1238.688100] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1238.688121] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1238.688136] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1238.688149] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1238.688162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1238.688175] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1238.688203] 00:12:09 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) 00:12:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}], 0x1, 0x9) 00:12:09 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x90c0000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:12:10 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x26, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e31393337373136313800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040000c00000000000000daf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000005500000000000000", 0x40, 0x540}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000daf4655fdaf4655fdaf4655f00"/8224, 0x2020, 0x2000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x4400}, {&(0x7f0000012700)="200000006c84f94f6c84f94f00000000daf4655f00"/32, 0x20, 0x4480}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030000000", 0x40, 0x4800}, {&(0x7f0000012900)="20000000000000000000000000000000daf4655f00"/32, 0x20, 0x4880}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040000000", 0x40, 0x4c00}, {&(0x7f0000012b00)="20000000000000000000000000000000daf4655f00"/32, 0x20, 0x4c80}, {&(0x7f0000012c00)="c041000000300000daf4655fdaf4655fdaf4655f00000000000002008000000000000800000000000af301000400000000000000000000000300000020000000", 0x40, 0x6800}, {&(0x7f0000012d00)="20000000000000000000000000000000daf4655f000000000000000000000000000002ea00"/64, 0x40, 0x6880}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x6c00}, {&(0x7f0000012f00)="ed8100001a040000dbf4655fdbf4655fdbf4655f00000000000001008000000000000800010000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000303a62f7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000", 0xa0, 0x7000}, {&(0x7f0000013000)="ffa1000026000000dbf4655fdbf4655fdbf4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3139333737313631382f66696c65302f66696c653000000000000000000000000000000000000000000000cb5c36a8000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000", 0xa0, 0x7400}, {&(0x7f0000013100)="ed8100000a000000dbf4655fdbf4655fdbf4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c413993000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x7800}, {&(0x7f0000013200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000dbf4655fdbf4655fdbf4655f00000000000002008000000000000800010000000af30100040000000000000000000000030000006000000002000000010000006200000002000000018000006200000000000000000000000000000015f2e0ab000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000", 0xc0, 0x7be0}, {&(0x7f0000013300)="ed81000064000000dbf4655fdbf4655fdbf4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c704a6689000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x8000}, {&(0x7f0000013400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x83c0}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000013600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e80f0000", 0x20, 0x20000}, {&(0x7f0000013700)="00000000001000"/32, 0x20, 0x21000}, {&(0x7f0000013800)="00000000001000"/32, 0x20, 0x22000}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x30000}, {&(0x7f0000013a00)="0200"/32, 0x20, 0x30400}, {&(0x7f0000013b00)="0300"/32, 0x20, 0x30800}, {&(0x7f0000013c00)="0400"/32, 0x20, 0x30c00}, {&(0x7f0000013d00)="0500"/32, 0x20, 0x31000}, {&(0x7f0000013e00)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000400"/96, 0x60, 0x31400}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x40000}, {&(0x7f0000014000)="0200"/32, 0x20, 0x40400}, {&(0x7f0000014100)="0300"/32, 0x20, 0x40800}, {&(0x7f0000014200)="0400"/32, 0x20, 0x40c00}, {&(0x7f0000014300)="0500"/32, 0x20, 0x41000}, {&(0x7f0000014400)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000400"/96, 0x60, 0x41400}, {&(0x7f0000014500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x50000}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="5bd05fb6bc018703cee1786b10380cd98206568a99301fc2fc6d8531056168ef2453a62ed2222cfef994d3fa40adf72dd39e5dbdecfa6953906723649b8720d8d6f3f02d44ac2f8948000000000000d2d81a8d9dff020dae91a7d95e4e3cb4bdc6bbfa93f92ba20c540dbe89ace415f26de88a93aef2c762609516097a7f2ee357a0918d684300000000000000000000000000000001f8ffffffffffff"]) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:12:10 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r2}, {r3}], 0x2, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) tkill(r4, 0x29) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000001c0)=ANY=[@ANYBLOB="01001700ce0b1b027c0f676b1ce37c86342cec3e600cb487925c0cdb07ec0c4e2c64eb2be4ea113e42e52668a4d074b24a8f4d3ab2398483e8b76141bfcc06b90b30bc0896a0e7a901f441db32b346e0d45fe1fdb3b8648a9928b0eb7d962ef56f2ad3a2ba89c661dd59db75d44fb1a3fe3071e152700f44b561db9eed93d1b1f5d8548484df7db46df9dd9eb2b4c2486d9c2eb4781190f2cb3e56703099cba70ef89afba7f7c1a6"]) 00:12:10 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x400300, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1238.840768] journal_path: not usable as path [ 1238.841570] EXT4-fs: error: could not find journal device path [ 1238.852590] journal_path: not usable as path [ 1238.853329] EXT4-fs: error: could not find journal device path 00:12:18 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:12:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}], 0x1, 0x9) 00:12:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(0x0, 0x0, 0x9) 00:12:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:12:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 40) 00:12:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = getpid() ptrace$setopts(0x4206, r0, 0x401, 0x0) pidfd_open(r2, 0x0) pidfd_open(r2, 0x0) r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) r4 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x17, 0x4, &(0x7f0000001300)=[{&(0x7f00000001c0)="b7ec1028e8152b394a8ad85076b7aeb2899cbf569f43daa5675af1da0d33500966468d55e596be1d3cc801e56c9f00509858f69fe2435f835c65e75fd127fe00e67a7317583c92a4ce383316275ea6fea6759d562599dd5fc418b5297c45e99ff9382933af5ec0a4138850c47b552b38ac10f44d42aae589fb714ecd6db49072d4e704860c9e11ef04f7a1015d271a67e24434b3a7e6ef2afd523c930a412b6f2aaf05a622d169162d765ae46588f6af8b6e78ad8d3d0c58f12f7946691b16531042dce0cad6779f244dee17a737ccfb34922c80e684f937562eb518d15ed20fa7e88fa4f4adcf847170dd41e303a9e333c1fd71e18eaa91", 0xf8, 0x9}, {&(0x7f00000002c0)="701b2741acb9c8475fb204856711e5095eef127446f64727fa1e7a65ba82297b157eb720eafd4e877fc7700267924ccc099c374212751733b8aa1d85872f0b17bb7a851de3affed4c31e919ada26059b84e38c8eedd5ab4e9122d358d09e997d6050a4a93f55b9dd5421dbe6c1457fc1f90764540cb03592ec9051e85c7803e787457e75faf4148e4deb6752e2d2df4a0dfdea1158ab79790d075f210a9dc8d4a5815fadbb8fafd2fb782ab627bfee2b3dad6c952b0fc7a1dec87705a81f18c27a327326d9ee4c0a1211fc5f364fffbcfdfd12371ebcfd8abd80f8accf145bef3185cebbdd6c641b282cc65988ba8be7987085416b19c8fc81286fa04f223674b827e922d80fce217c436fe3d787400b632489201f4a6c7c09a81fa1b41b89f69a50ba50cbb727e1f3a22d73ffb529203dbc21900ed4baaa1c33d60e3917a8d18a583446fdc94d291ee613d240fae515394044d078882bf6f62bd70ed9e2bbfd5271f3b5770301e5981cfa24cf884d4b06fc0ffb4982305e45af12b6f3f49588283f94ba3aa26e53ceb5923754fc795480df3b1e573e5498eab2d2c62409d0df3088710169943e1e48463a75486943c77b1b1eb6d2556c0e96142e54336da98e2575d6a0448acf6bb466193c81fe4a506e8b27c16884d4d6058460cacdeadf7290e5019843bcceec8eb521fa0af72fc2d175ba8163c35b8e197a685a63cae6fb1248752c643c83de29f7825406d819e50027a096b0161c2713abbcb54df39e931ca5016aebf5c20ca156963649ebe8842b2d7d3b3750b05e37225746445e8838c8254cc685bba33e1b8c1117f13cc08b044b55a6288c74dfa32969168d6ce055306081f08a41cf8aa8fab03f20bfeb19ec64e63aacbe2bfb041381b5a6f80363cabe1dfaf89709af26b5b27a4840c19f245f82a72f52d627feec3a19665f1334ce06fc1fce551217b67c4daded29a555c2bd175fd715e3cf401b9e0a14e2e6a41720c45e0c8b32c12f72faef99b22fa3958acae351791dbcfb054e75b484e6d196ed0122b67d1221c16dd6429cac35ed707af65943bd36dbf3eed72c97d3cbd443312275101296570743318f1a51f623a87fdda13b2bdd62a7a1fc2b741e9a9318744d7a85fc212f380f0bf2054daf9c902edc1f26e97f808c9903654ba4db190af9e85ba89b6bd88afe7be000d04621a94e67b7e04db724668b2d613a28b179b3ee6e2eb6f7aef023120d419ecd78437aba81a13bf7bed933c89b645aa9b6866aa7b5b1f1d39f1e9d3287816ad019401fec4f2bceb24125e3fdc3ec91f0114cf759a680717d7cf40e11be7b144c744d7512d775a7f94c08428e8b2790a926f8c6b6738e62d8fb7cec3b3f6d92622eeda0271b0ee03cea77714129eee32f3a57e32a440486c0cdec718d3da3712ed866b0d10b58600a15fdd49433fa4c6d8c6675e17c60ee81db7e212d642095db9a47ef62e8f5ca7d202d6c359765fdc3e01b997f20212c0b9692c9c0dd7e29be6f091f3f35b6fe59d326b398d9d8dde4bf3f8291c720dcf4d50e35ae940e5c7a66ac8fc47b4b1f04298453f358deaae6cb58691f7accf3642ce11ce9e03439530db1a053841e45d21ec19bdfc85a343d6194e97b246d96fd045f30c9ffe550432ee1b3e8e3ec01a232d740f578cbe0f309e2666bb2d4e771f15db2f414b528517c16984c00ce0de55d1f1e77284ce7f4a1a5aef70362b67783f502f3cdabe77bc3135dacf11f4c8dd300906ef0e66695c5f9abbe2113a5e9ec112d23bb722ea5ce5fb665d173565ce7cbd8aca7a4038562a76dadf0d9ae7222cc7922422124f2c34e238d405375d1511c9ac03878027c7fb267b4c0f481fd3f50a0662531182c6676a66363719b49c79298183692020f9005f62062eb33107a949489db768512d22fba79eb0add12d0c9fc0cda2be1284faadeb23a8c5db55c30c785837230a00a74d847c1b5f7d1c6d38219145552d4e72525eece091b660156d1a6d2cda7e3d9f2c3c69b4b56167d90f9342f4a892b5c39db9b438b886d7abdd5bcd5799c2615b330ce2392219f9658e9e0564fdddacb3004077bb6c5bbd580312bb8c61a5f381b6030983e597451b7bd9e5827549d022dbb125ee2f2ecac713217f05bb77fd6e5e6fae9f0c6e70fcf0ef10f4c6240f1c5b95de542f1d351f6dc9727bbf078d3d7b9442298d2fa7a655a044ad2ca4aea8905961ba32b704e3d57d92dcada30691fda82c3a1316b75b091c9550860538349a0ea67e9316836381fd5bba8c0db7641d70279c2f6490d4f29c78428e41278471136d9d98bb991f1f7602c6f077c6f3f0dc6a705097ee3c8665fea803610bca3f4f869eec18d648f9360973d13c2de07655ba4cc63ee8cb5efab7fafb267235b838ae677402c25b33e8d428cc5f0d8ecfe57e7638fb1f2cdb02e9a8060677f7fd2aa9a16f64d80b341ca148fa2eb8b6c848925c089e37d7060f985ed037bf42296849d2e3c5dd48180bd83a86b837fb5159eff608524c4ed67abe3d04ec0613d5198ced062b745c2c423a6389edf568912ba2bf2274ef26f6e04e40eb0911e81cebca6d91056f07d5927af314e8d5e4736f6b56831ff71deac47c09460a02a14defc96688a1e7da2d44d3b83ae2fb33aaf725ebe4619340ee4c779bf2d2382e3eec8dc2735191687716be8a81aa8619cd5518a4fabdcd52bb22fd92feb862ed7f4cebb280249ce832e8b9002ac9c86630657690537881ffca7c9f2994da4c8d528c747d8dddd83203ecb2205c28497ddd46f94c38a10f521c018b924b5149ab69e38e34418ebe2b95233a0ca206adc57c6946092e8bd2003cc561f67648a11b05a529341268b3a4f1732c62dd0dd6eb7e832d0f345b9eecdb5b0070dd3c8bc5a51592987cdffe29aa93c247ff76473910b742bef6ff8102fa21a7384126a0f5b908e70f1aefdcf239b27cbfe6ee9ad7eb167fb004e610eae1cb14f04ce50ba195a94d9a855dd71a3f69da277133685100ec7ec5c509aed8c93e49a9ec49ff46c9795b54f91970f10a60c82693800fa3b281161af22b07e708bbb3db2f304316633f0f5b6c0f91a2c05dffab46055a60859b76fed9477fa604c8394f1552fe6274d6e419a6e6dc13fd26371b275c3e69fd7a18a3d22ea2cade8c3f307173bcca814ae48207c1c02ed82ed88c0a02553a87d463eedc3fbb448193db4d6dbdd0dd04f2f8221204c4db464639433294291760cff1ef630b3402afa97e27895f438f142cea9101f6a6d2c5bf83cccfdacb4bab138bdb939bfcd92c844bd85e776e3463ca68a223df0ab52f9b6aa16709ed694e4b64efad52c6e2f1c2114ce7a620b44034e95375e22e28e6ba059bb874d05d0b75af55ecd19cbd94fd96ef1387574d6a9dd984e14965cb2b03a1d397d1b280727c388dd9e83077d148a1a33fb5682c9f8cfea7106132ed8983aec8c40514b685ce95926b631d8c773c6735a548a698405f01ffa0b121aceae87074220096a9599ac2c87b3a27ca6064c239fd6f7a6d468b4c9bf5738719e18d16b0daf78d8a1fa9ffdf3fd5148b41d5b1c7446cffc4776386f4036927fe2d4a940607362401427b834b9aa4049f57e56fde1d7f118b93e53d7fbd4b4d47ff51c9ca4fc2cd10d61d7923420158c2d45141df1e1986252f3957dd6a51c7920c6680fddefc3cdaada9c3873df5df478a8191d0fa0814f30e677f875860f7b8561e34ee5abe81af376d342dbf14df0983f72ad2d8344a8562ae1e2c25eafb3741574596556ab077f4ad4cc084725c5ffcc23bf30a38d76b89598b436da6da7a2a4e089881ca9d53330f3cf39d214c14a89e83fbbdcfb6aa5fd3692ae0327d4cf64163e8791d99a784cf14c7095f99eadb34825cce11575012a4ffbbe1fc2b222b289b65ba0d033cee6c963ec70d6a8fd5956845e12e1de0c91ef55bded187e4d94170f7cc9edd856fee62503b830f2cb66699b969059898e826853a2276b7f1b59f00972a4be91ef5bc991fae60161bd42e824b4e0c8d5e6bba9f70f5022030e1aced5be173540df99318240d25964925d7a3feabbfd931dd95cbd58bf2c1258dc3d4c475132f75b30056e2829c639751d435be3d9e4da5cc220e361465e7a4b917c3fabd937fe5a8fe79a1b822b427cb9d2f940dc39f14325d5f709f9f377bfb676392fce79215b6fe4928962489dc3c3b9af04eb28edd882c62b2e5cb5a32cebe2a3c609e2cb22fff2945fc8ce0024a9d20876fc05b04355e43f6106f2ab4ee8d082a3e70a1c9cc4b22c9a422640c7adcdbdb1b2229a2b9dd13b6aff9eae413846e3c4b05d493bf6eb160beec5dff214087264073371dd461ee03115d2ffa1536eabbb9ffaef233aaff00744a41186677c8fdf6a4b93f9a42588e832589f798eaef6d32cb869d085b99df56198d7206936431c8d137cb7180872b8d3513c393c9ddbb24dfc11bbd60e166798082290afd91f24386aeb36ae070142dcfe462f92bae85810aaf23b3354540477d28bc05fae6e21443c8af1ef0cbd3f37fc4b08e4c8b0e804aae3ccdf5e48d767ed6b1fd8d386d9b01eaa08d3675a1899decefea6129e5bed051c64acc4a21c7b4c4ee29f9910260ab139f604e1b5f20f7b43169802385e210384fa1822ed8687ccf17872a70125315ec3b23579e90608e9c9e4a73756da5a8756cb1f6d0a0e7ec1e837297701bfbf1b03477288991933c3954408528f033ea2acbdcf938f762bb480b2e9793a8dd014fc1a72366d0fcaf7c7c3101dd830b09d1979c30711f9bedb55f8d0120d08b40bc5fbc0da768a0ddfe66b3879b30d0966697b9d3e0b2ae8c51ca2a2d8336c0cd78b94242ab13ed318247b80b84cc3e2ca5a47ff3f01e7433dbb8917b76ec921e591ade52b63a4277ae0a68e356d8556841c2323714d8f989c8fa98324b36ce697c7bd289db608047946475d241bd70ba879db0d418f83dfd354eb4202f6773fc761de849026e87af697e05edf44e95d090cc8de9efd381e51f8fce9914314981347aacf0f2ce67afe8ba7efabd6d09f53b93297c7034c4ea5ac8d9d563b41024860d8924a9c66c321edd41acc3e0aa28b3e033a06e861e834e73e1711c88c08eee502a20ef49568d60368836c1d2298edb1c1cd9ed1b0360abe7490cdcf8a524bc9b74afe7110976c1c8e3eb3d7bd65fe46bbe6d6e66550edd1fa74aaddba407a44af9a7e6f21fde7676f114e93d267fbfbc5431431f6e2e49e8bf71098b60f75c3fe6c88273440e2b74a370e8a9a828bb516668221c43dfe9b4addd151fa98d23c342b952920e0d5d6cc475fd60069f8539ecc3e054e10260af5217c495342f7df28e20e846c812502e6a52b5a072231039532d8949dba06b6f78fcd008926e7fbfbd59cde35346a5adcc59a7a47be7cdf260818e693d4e51e637b758587ee4a5b8d99f1e09c2a1ca453a03cb128461eac0c9d346618b312048d6d2af348bcdb8142e4eff9f7dd2c4b7f404f6fea908de8fe248f957c625a4f751084924e805ba0e63ab6a5d99900ef66abe6a72a12a916e925550cf0d180a44605407396d96946b94380ef1928e531da4d04ad1b5ced38134229f49ad67d9a50e94cdc64e763156dfcb123fbeda9a8aea9cf41485428ef86067d81e60f96db885c45163fa5478775f0dd0c2ea3236ad3c390de5a61024ed97337c012e6fd7778a47bcce3d7f48c77c87d7dd86634a18bae6d402b1d9c3fde67e4f6c7aa3daf1a9e13f47cecb3dfe9c1967dbc189aad442cfc52560d420a1e6d222b77d1c313de01780760df863a07", 0x1000, 0x1c53}, {&(0x7f0000000080)="912f672569cf2975bf6f7e08e65596b3f1f0a8fc309dc31ce10e4af2636db2145051c8a460e1e2281849d5293411846408fdd737b80d50760f7aed013e21e65432a13a8e37ae3d03f37e468d8d", 0x4d, 0x800}, {&(0x7f00000012c0)="c1bcd012bf54be13434b1521176c80bf2ce1d84e102349eb1590b60a42efdb2237bf5c71d9e61dbd066e74529924e20ccd6259", 0x33}], 0x2000011, &(0x7f0000001380)={[{}, {@mode={'mode', 0x3d, 0x800}}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@iocharset={'iocharset', 0x3d, 'cp861'}}], [{@audit}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001400)='/proc/bus/input/handlers\x00', 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r4, &(0x7f0000001540)={r5, 0xffffffffffffffff, 0x378}) name_to_handle_at(r5, &(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)=@shmem={0xc, 0x1, {0x9, 0x6}}, &(0x7f0000001600), 0x1000) poll(&(0x7f0000001480)=[{r1}, {r3}], 0x2, 0x9) 00:12:18 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xff\xff') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:12:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xf0ffff, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:12:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 41) 00:12:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}], 0x3, 0x9) [ 1247.721118] journal_path: not usable as path [ 1247.721521] EXT4-fs: error: could not find journal device path [ 1247.727096] journal_path: not usable as path [ 1247.727497] EXT4-fs: error: could not find journal device path [ 1247.743418] loop4: detected capacity change from 0 to 28 00:12:18 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x13000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:12:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}], 0x1, 0x9) [ 1247.765649] FAULT_INJECTION: forcing a failure. [ 1247.765649] name failslab, interval 1, probability 0, space 0, times 0 [ 1247.766634] CPU: 0 UID: 0 PID: 10021 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1247.766650] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1247.766657] Call Trace: [ 1247.766661] [ 1247.766665] dump_stack_lvl+0xfa/0x120 [ 1247.766681] should_fail_ex+0x4d7/0x5e0 [ 1247.766701] ? __register_sysctl_table+0xd4f/0x16a0 [ 1247.766716] should_failslab+0xc2/0x120 [ 1247.766728] __kmalloc_noprof+0xb4/0x4b0 [ 1247.766744] ? lock_release+0xc8/0x290 [ 1247.766760] __register_sysctl_table+0xd4f/0x16a0 [ 1247.766777] ? __pfx___register_sysctl_table+0x10/0x10 [ 1247.766791] ? register_pidns_sysctls+0x4b/0x1c0 [ 1247.766808] ? __asan_memcpy+0x3d/0x60 [ 1247.766827] register_pidns_sysctls+0x119/0x1c0 [ 1247.766840] copy_pid_ns+0x54c/0xd20 [ 1247.766856] ? __pfx_copy_pid_ns+0x10/0x10 [ 1247.766871] ? __create_object+0x59/0x80 [ 1247.766885] ? copy_mnt_ns+0xac/0xab0 [ 1247.766903] ? kmem_cache_alloc_noprof+0x352/0x470 [ 1247.766920] ? copy_ipcs+0xb7/0x630 [ 1247.766936] create_new_namespaces+0x2b2/0xab0 [ 1247.766955] copy_namespaces+0x45c/0x580 [ 1247.766971] copy_process+0x26d5/0x73e0 [ 1247.766989] ? __pfx__kstrtoull+0x10/0x10 [ 1247.767013] ? __pfx_copy_process+0x10/0x10 [ 1247.767031] ? __might_fault+0xe0/0x190 [ 1247.767046] ? _copy_from_user+0x5b/0xd0 [ 1247.767062] kernel_clone+0xea/0x820 [ 1247.767079] ? get_pid_task+0xfd/0x250 [ 1247.767097] ? __pfx_kernel_clone+0x10/0x10 [ 1247.767118] ? find_held_lock+0x2b/0x80 [ 1247.767134] ? ksys_write+0x121/0x240 [ 1247.767151] ? lock_is_held_type+0x9e/0x120 [ 1247.767171] __do_sys_clone3+0x1f5/0x280 [ 1247.767182] ? __pfx___do_sys_clone3+0x10/0x10 [ 1247.767202] ? perf_trace_preemptirq_template+0x259/0x430 [ 1247.767222] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1247.767239] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1247.767259] ? __pfx_ksys_write+0x10/0x10 [ 1247.767280] do_syscall_64+0xbf/0x360 [ 1247.767293] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1247.767305] RIP: 0033:0x7f752ccf6b19 [ 1247.767314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1247.767325] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1247.767337] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1247.767345] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1247.767352] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1247.767359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1247.767366] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1247.767381] [ 1247.776848] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 1247.777544] sysctl could not get directory: /kernel -12 00:12:19 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}], 0x2, 0x9) 00:12:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1247.839344] loop4: detected capacity change from 0 to 28 [ 1247.842264] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 1247.928960] journal_path: not usable as path [ 1247.929450] EXT4-fs: error: could not find journal device path [ 1247.933445] journal_path: not usable as path [ 1247.933848] EXT4-fs: error: could not find journal device path 00:12:28 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:12:28 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}], 0x2, 0x9) 00:12:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) 00:12:28 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000080)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:12:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x1000000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:12:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x0) 00:12:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 42) 00:12:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x5, 0x92, 0x1, 0x0, 0x2, 0x2020, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0xfc5, 0x7}, 0xa00, 0x9, 0x8, 0x8, 0x2, 0x4, 0x8, 0x0, 0x4, 0x0, 0xff}, r3, 0x9, 0xffffffffffffffff, 0xa) 00:12:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x0) 00:12:28 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}], 0x2, 0x9) [ 1256.998168] journal_path: not usable as path [ 1256.998959] EXT4-fs: error: could not find journal device path 00:12:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 43) [ 1257.020147] journal_path: not usable as path [ 1257.021169] EXT4-fs: error: could not find journal device path [ 1257.054562] FAULT_INJECTION: forcing a failure. [ 1257.054562] name failslab, interval 1, probability 0, space 0, times 0 [ 1257.055545] CPU: 0 UID: 0 PID: 10065 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1257.055561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1257.055569] Call Trace: [ 1257.055573] [ 1257.055578] dump_stack_lvl+0xfa/0x120 [ 1257.055597] should_fail_ex+0x4d7/0x5e0 [ 1257.055621] ? alloc_pid+0xd5/0x1100 [ 1257.055640] should_failslab+0xc2/0x120 [ 1257.055653] kmem_cache_alloc_noprof+0x5f/0x470 [ 1257.055670] ? __local_bh_enable_ip+0xa1/0x110 [ 1257.055691] alloc_pid+0xd5/0x1100 [ 1257.055712] copy_process+0x3bd2/0x73e0 [ 1257.055731] ? __pfx__kstrtoull+0x10/0x10 [ 1257.055756] ? __pfx_copy_process+0x10/0x10 [ 1257.055774] ? __might_fault+0xe0/0x190 [ 1257.055790] ? _copy_from_user+0x5b/0xd0 [ 1257.055810] kernel_clone+0xea/0x820 [ 1257.055827] ? get_pid_task+0xfd/0x250 [ 1257.055845] ? __pfx_kernel_clone+0x10/0x10 [ 1257.055866] ? find_held_lock+0x2b/0x80 [ 1257.055883] ? ksys_write+0x121/0x240 [ 1257.055901] ? lock_is_held_type+0x9e/0x120 [ 1257.055922] __do_sys_clone3+0x1f5/0x280 [ 1257.055932] ? __pfx___do_sys_clone3+0x10/0x10 [ 1257.055953] ? perf_trace_preemptirq_template+0x259/0x430 [ 1257.055973] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1257.055990] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1257.056009] ? __pfx_ksys_write+0x10/0x10 [ 1257.056031] do_syscall_64+0xbf/0x360 [ 1257.056044] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1257.056057] RIP: 0033:0x7f752ccf6b19 [ 1257.056066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1257.056077] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1257.056089] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1257.056097] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1257.056104] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1257.056111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1257.056118] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1257.056134] 00:12:28 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000001640)=[{&(0x7f0000000240)=""/73, 0x49}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/162, 0xa2}, {&(0x7f0000001380)=""/194, 0xc2}, {&(0x7f0000001480)=""/115, 0x73}, {&(0x7f0000001500)=""/31, 0x1f}, {&(0x7f0000001540)=""/184, 0xb8}, {&(0x7f0000001600)=""/30, 0x1e}], 0x8, &(0x7f00000016c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x118}, 0x10000) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xd5, 0x5, 0x5, 0x7f, 0x0, 0x7, 0x100, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000080), 0xa}, 0x0, 0xffff, 0x0, 0x4, 0x100000000, 0x80, 0x1f, 0x0, 0x10d1, 0x0, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:12:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x2000000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:12:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) 00:12:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_secret(0x0) dup2(0xffffffffffffffff, r0) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/ip_mr_vif\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) mq_notify(r2, &(0x7f00000000c0)={0x0, 0x6, 0x0, @tid=r3}) r4 = pidfd_open(r1, 0x0) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r5}], 0x2, 0x9) 00:12:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x0) 00:12:38 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) 00:12:38 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:12:38 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:12:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x3000000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:12:38 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 44) 00:12:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 00:12:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x0) 00:12:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x1, 0xa8, 0xf2, 0x0, 0x3f, 0x59902, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x3, 0xff}, 0x0, 0xfffffffffffffffe, 0x9, 0x9, 0x606, 0x4, 0x1, 0x0, 0x7, 0x0, 0x7fff}, r0, 0x1, 0xffffffffffffffff, 0x0) r3 = getpid() r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = accept4(r4, 0x0, 0x0, 0x80800) pidfd_getfd(r1, r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r6, 0x0, 0x0, 0x80800) ppoll(&(0x7f0000000080)=[{r6, 0x8000}, {r5, 0x20}], 0x2, &(0x7f00000000c0), &(0x7f00000001c0)={[0x8]}, 0x8) pidfd_open(r3, 0x0) pidfd_open(r3, 0x0) tgkill(r3, r3, 0x16) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) [ 1267.777633] journal_path: not usable as path [ 1267.778474] EXT4-fs: error: could not find journal device path [ 1267.790786] journal_path: not usable as path [ 1267.791786] EXT4-fs: error: could not find journal device path 00:12:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 45) 00:12:39 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:12:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:12:39 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x24000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:12:39 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x200}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x81, @remote, 0xe9}, 0x1c) pread64(r0, &(0x7f00000000c0)=""/62, 0x3e, 0xfffffffffffffffd) 00:12:39 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) 00:12:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x4000000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1267.981334] journal_path: not usable as path [ 1267.982223] EXT4-fs: error: could not find journal device path [ 1267.992116] journal_path: not usable as path [ 1267.992916] EXT4-fs: error: could not find journal device path 00:12:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r1, 0x0, 0x0, 0x80800) r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r2, 0x0, 0x0, 0x80800) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f00000002c0)={{r2}, "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"}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000080)={0x3, {{0xa, 0x4e20, 0x7fff, @loopback, 0xfffffffa}}}, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) setsockopt(r3, 0x1, 0x6, &(0x7f00000001c0)="3fe0961315f6c52767fd9cdf9d33dbe219265ebde39d9574a0dd7a9d69efbb0289b036e507584af705028ed76651964a06219864478d172b44d3b160a45935464c603e2d559e0b9dd8ff4bbcf22a500b03ac938387f38bae58c4843ed241011c23feea4f55dbc0ef693d32214db12e01cef86f8efa706a26835eee0cef9fda23760a0789da7e5c9c7cbfd1727c952842252fa658b4be812ddbb73686895145842e4ebd235b02a1739905b1e59051c31e662692fbe4da0e96758fc79be02d3e264b73b9e70f0bedd9400ceb96", 0xcc) 00:12:52 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:12:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 46) 00:12:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:12:52 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:12:52 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) 00:12:52 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x5000000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:12:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x4f}, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x40000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) [ 1281.113576] journal_path: not usable as path [ 1281.114132] EXT4-fs: error: could not find journal device path [ 1281.115132] journal_path: not usable as path [ 1281.115521] EXT4-fs: error: could not find journal device path 00:12:52 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}, {0xffffffffffffffff, 0x8000}], 0x2, 0x9) 00:12:52 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0}], 0x3, 0x9) 00:12:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:12:52 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:12:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 47) 00:12:52 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x6000000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:12:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) rt_tgsigqueueinfo(r0, r0, 0x1e, &(0x7f00000001c0)={0x9, 0xb8, 0x9}) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) r3 = getpid() pidfd_open(r3, 0x0) pidfd_open(r3, 0x0) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r5 = accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10) fcntl$dupfd(r4, 0x406, r5) [ 1281.267650] FAULT_INJECTION: forcing a failure. [ 1281.267650] name failslab, interval 1, probability 0, space 0, times 0 [ 1281.268684] CPU: 0 UID: 0 PID: 10156 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1281.268700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1281.268708] Call Trace: [ 1281.268712] [ 1281.268716] dump_stack_lvl+0xfa/0x120 [ 1281.268735] should_fail_ex+0x4d7/0x5e0 [ 1281.268757] should_failslab+0xc2/0x120 [ 1281.268770] kmem_cache_alloc_lru_noprof+0x73/0x460 [ 1281.268787] ? find_held_lock+0x2b/0x80 [ 1281.268808] ? alloc_inode+0x181/0x250 [ 1281.268822] ? lock_is_held_type+0x9e/0x120 [ 1281.268842] alloc_inode+0x181/0x250 [ 1281.268855] path_from_stashed+0x1b2/0x660 [ 1281.268872] ? lock_release+0xc8/0x290 [ 1281.268886] pidfs_alloc_file+0x101/0x250 [ 1281.268900] ? __pfx_pidfs_alloc_file+0x10/0x10 [ 1281.268917] pidfd_prepare+0x117/0x1c0 [ 1281.268938] copy_process+0x3c4d/0x73e0 [ 1281.268963] ? __pfx_copy_process+0x10/0x10 [ 1281.268981] ? __might_fault+0xe0/0x190 [ 1281.268996] ? _copy_from_user+0x5b/0xd0 [ 1281.269013] kernel_clone+0xea/0x820 [ 1281.269030] ? get_pid_task+0xfd/0x250 [ 1281.269048] ? __pfx_kernel_clone+0x10/0x10 [ 1281.269070] ? find_held_lock+0x2b/0x80 [ 1281.269085] ? ksys_write+0x121/0x240 [ 1281.269103] ? lock_is_held_type+0x9e/0x120 [ 1281.269122] __do_sys_clone3+0x1f5/0x280 [ 1281.269133] ? __pfx___do_sys_clone3+0x10/0x10 [ 1281.269153] ? perf_trace_preemptirq_template+0x259/0x430 [ 1281.269173] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1281.269190] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1281.269209] ? __pfx_ksys_write+0x10/0x10 [ 1281.269231] do_syscall_64+0xbf/0x360 [ 1281.269244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1281.269257] RIP: 0033:0x7f752ccf6b19 [ 1281.269266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1281.269278] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1281.269290] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1281.269297] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1281.269305] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1281.269312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1281.269319] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1281.269335] 00:12:52 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x8000}], 0x2, 0x9) [ 1281.326630] journal_path: not usable as path [ 1281.327426] EXT4-fs: error: could not find journal device path [ 1281.332505] journal_path: not usable as path [ 1281.333284] EXT4-fs: error: could not find journal device path [ 1283.949510] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 1283.952420] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 1283.955511] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 1283.959207] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 1283.963261] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 1286.046951] Bluetooth: hci5: command tx timeout [ 1288.095917] Bluetooth: hci5: command tx timeout [ 1290.143252] Bluetooth: hci5: command tx timeout [ 1292.190900] Bluetooth: hci5: command tx timeout [ 1300.260247] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1300.261453] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1300.321173] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1300.322420] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 00:13:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:13:20 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x7000000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:13:20 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0}], 0x3, 0x9) 00:13:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 48) 00:13:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x8000}], 0x2, 0x9) 00:13:20 executing program 4: ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$getflags(r3, 0x3) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4800, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000040)) ioctl$TIOCL_SETVESABLANK(r4, 0x541c, &(0x7f00000000c0)) 00:13:20 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:13:20 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xb0, 0x0, 0x4, 0x70bd29, 0x25dfdbff, {}, [@HEADER={0x4}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x24048015) [ 1309.741578] journal_path: not usable as path [ 1309.742183] EXT4-fs: error: could not find journal device path [ 1309.750280] journal_path: not usable as path [ 1309.750838] EXT4-fs: error: could not find journal device path 00:13:21 executing program 2: poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:13:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x8000}], 0x2, 0x9) 00:13:21 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xffffe000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:13:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x9000000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:13:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 49) [ 1309.872734] journal_path: not usable as path [ 1309.873172] EXT4-fs: error: could not find journal device path 00:13:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r0}], 0x2, 0x9) [ 1309.880838] journal_path: not usable as path [ 1309.881211] EXT4-fs: error: could not find journal device path 00:13:21 executing program 2: poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:13:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}, {0xffffffffffffffff, 0x8000}], 0x2, 0x0) [ 1309.994310] FAULT_INJECTION: forcing a failure. [ 1309.994310] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.996355] CPU: 1 UID: 0 PID: 10673 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1309.996388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1309.996401] Call Trace: [ 1309.996409] [ 1309.996418] dump_stack_lvl+0xfa/0x120 [ 1309.996449] should_fail_ex+0x4d7/0x5e0 [ 1309.996489] ? security_inode_alloc+0x3e/0x130 [ 1309.996524] should_failslab+0xc2/0x120 [ 1309.996548] kmem_cache_alloc_noprof+0x5f/0x470 [ 1309.996581] ? lockdep_init_map_type+0x4b/0x240 [ 1309.996613] security_inode_alloc+0x3e/0x130 [ 1309.996650] inode_init_always_gfp+0xc94/0xff0 [ 1309.996684] ? lock_is_held_type+0x9e/0x120 [ 1309.996722] alloc_inode+0x8d/0x250 [ 1309.996747] path_from_stashed+0x1b2/0x660 [ 1309.996780] ? lock_release+0xc8/0x290 [ 1309.996817] pidfs_alloc_file+0x101/0x250 [ 1309.996844] ? __pfx_pidfs_alloc_file+0x10/0x10 [ 1309.996879] pidfd_prepare+0x117/0x1c0 [ 1309.996931] copy_process+0x3c4d/0x73e0 [ 1309.996981] ? __pfx_copy_process+0x10/0x10 [ 1309.997017] ? __might_fault+0xe0/0x190 [ 1309.997047] ? _copy_from_user+0x5b/0xd0 [ 1309.997080] kernel_clone+0xea/0x820 [ 1309.997115] ? get_pid_task+0xfd/0x250 [ 1309.997150] ? __pfx_kernel_clone+0x10/0x10 [ 1309.997194] ? find_held_lock+0x2b/0x80 [ 1309.997225] ? ksys_write+0x121/0x240 [ 1309.997258] ? lock_is_held_type+0x9e/0x120 [ 1309.997297] __do_sys_clone3+0x1f5/0x280 [ 1309.997318] ? __pfx___do_sys_clone3+0x10/0x10 [ 1309.997355] ? __fget_files+0x20d/0x3b0 [ 1309.997393] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1309.997429] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1309.997465] ? ksys_write+0x1a3/0x240 [ 1309.997498] ? __pfx_ksys_write+0x10/0x10 [ 1309.997541] do_syscall_64+0xbf/0x360 [ 1309.997567] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1309.997591] RIP: 0033:0x7f752ccf6b19 [ 1309.997609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1309.997631] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1309.997654] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1309.997669] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1309.997683] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1309.997699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1309.997713] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1309.997745] 00:13:31 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:13:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 50) 00:13:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}, {0xffffffffffffffff, 0x8000}], 0x2, 0x0) 00:13:31 executing program 2: poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:13:31 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) 00:13:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x9020000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:13:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:13:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=0xffffffffffffffff) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000580)={'tunl0\x00', &(0x7f0000000500)={'tunl0\x00', 0x0, 0x1, 0x0, 0x9867, 0x3, {{0x14, 0x4, 0x3, 0x4, 0x50, 0x68, 0x0, 0x1, 0x29, 0x0, @local, @rand_addr=0x64010100, {[@generic={0x94, 0x9, "dcceddcb001111"}, @ssrr={0x89, 0x7, 0x9e, [@loopback]}, @cipso={0x86, 0x29, 0x0, [{0x1, 0xa, "2dac22d564d5dc8d"}, {0x0, 0x7, "53bff635b6"}, {0x1, 0x12, "0bbfd89a4f42dbadd7ee76c80fc7edc8"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000640)={'gre0\x00', &(0x7f00000005c0)={'ip_vti0\x00', 0x0, 0x20, 0xf8de, 0x5, 0xfffffff2, {{0xc, 0x4, 0x3, 0x23, 0x30, 0x68, 0x0, 0x9, 0x2f, 0x0, @empty, @multicast2, {[@rr={0x7, 0xb, 0x4e, [@rand_addr=0x64010100, @empty]}, @cipso={0x86, 0x10, 0x3, [{0x0, 0xa, "e1497a2c186d65ee"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000800)={'ip6tnl0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x2, 0x6, 0x2, 0xffffff84, 0x24, @private1={0xfc, 0x1, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x21}, 0x7800, 0x20, 0x0, 0x400}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000000d40)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000d00)={&(0x7f0000000a40)={0x2c0, r2, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xa8, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x6002}, 0x8004) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = getpid() r9 = pidfd_open(r8, 0x0) r10 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r11 = syz_io_uring_setup(0x14f0, &(0x7f0000000040)={0x0, 0x0, 0x10, 0x0, 0x83, 0x0, r10}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r9}, {r11}], 0x2, 0x9) [ 1319.941569] journal_path: not usable as path [ 1319.942360] EXT4-fs: error: could not find journal device path 00:13:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 51) 00:13:31 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1319.959418] journal_path: not usable as path [ 1319.960448] EXT4-fs: error: could not find journal device path 00:13:31 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) 00:13:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xf000000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1320.014509] FAULT_INJECTION: forcing a failure. [ 1320.014509] name failslab, interval 1, probability 0, space 0, times 0 [ 1320.015563] CPU: 0 UID: 0 PID: 10712 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1320.015579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1320.015586] Call Trace: [ 1320.015590] [ 1320.015595] dump_stack_lvl+0xfa/0x120 [ 1320.015613] should_fail_ex+0x4d7/0x5e0 [ 1320.015634] should_failslab+0xc2/0x120 [ 1320.015647] kmem_cache_alloc_lru_noprof+0x73/0x460 [ 1320.015664] ? selinux_inode_alloc_security+0x10a/0x2a0 [ 1320.015679] ? __d_alloc+0x31/0xa10 [ 1320.015693] __d_alloc+0x31/0xa10 [ 1320.015706] path_from_stashed+0x373/0x660 [ 1320.015722] ? lock_release+0xc8/0x290 [ 1320.015738] pidfs_alloc_file+0x101/0x250 [ 1320.015752] ? __pfx_pidfs_alloc_file+0x10/0x10 [ 1320.015770] pidfd_prepare+0x117/0x1c0 [ 1320.015791] copy_process+0x3c4d/0x73e0 [ 1320.015820] ? __pfx_copy_process+0x10/0x10 [ 1320.015838] ? __might_fault+0xe0/0x190 [ 1320.015853] ? _copy_from_user+0x5b/0xd0 [ 1320.015871] kernel_clone+0xea/0x820 [ 1320.015888] ? get_pid_task+0xfd/0x250 [ 1320.015906] ? __pfx_kernel_clone+0x10/0x10 [ 1320.015928] ? find_held_lock+0x2b/0x80 [ 1320.015943] ? ksys_write+0x121/0x240 [ 1320.015961] ? lock_is_held_type+0x9e/0x120 [ 1320.015981] __do_sys_clone3+0x1f5/0x280 [ 1320.015992] ? __pfx___do_sys_clone3+0x10/0x10 [ 1320.016012] ? perf_trace_preemptirq_template+0x259/0x430 [ 1320.016033] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1320.016050] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1320.016069] ? __pfx_ksys_write+0x10/0x10 [ 1320.016091] do_syscall_64+0xbf/0x360 [ 1320.016104] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1320.016116] RIP: 0033:0x7f752ccf6b19 [ 1320.016125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1320.016137] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1320.016149] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1320.016157] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1320.016164] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1320.016171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1320.016178] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1320.016193] 00:13:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) 00:13:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}, {0xffffffffffffffff, 0x8000}], 0x2, 0x0) 00:13:31 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:13:31 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:13:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'security.', 'mountinfo\x00'}) r2 = dup2(r1, r0) recvmsg$unix(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/127, 0x7f}], 0x1, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x51, 0x4, 0x40, 0xc7, 0x0, 0x0, 0x80000, 0x7, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x101, 0x4, @perf_bp={&(0x7f00000000c0), 0xc}, 0x10000, 0x3, 0x80, 0x2, 0x7, 0x401, 0x80, 0x0, 0xdcb2, 0x0, 0x1ff}, r3, 0x2, r2, 0x8) pwritev2(r2, &(0x7f0000000740)=[{&(0x7f0000000340)="12e1f570dbea569b7abafba51b538b4dab6b8b306322ed1f8a3c0fd5dee609fc825af178fce84ba0d145d38fcf828bb92217d06901067d6b1c", 0x39}, {&(0x7f0000000380)="0f362e9c0d0f28b8ce77bd55b094d13a0a684ab536454ec972c49b0737a069761be84efff8aaf2f218689d946403f4b7", 0x30}, {&(0x7f00000003c0)="9fa91930542d976450db6cf680d733976a4c652b431d78b76108936c790993c8551fb133d9b748262c70f8e04094b2552444833abc11a02e0e72496f64f5ad875d967d4c38ca86b12d21605dd023136950491c69f184f77e78e804c75f88768239719e9bda16ae4001e0b4b388886448140308a68b298e3906354c8920200774810a65ce70527c776bde3deb268e94f6c897feeaa41b4ed0a0cfb68fcea6e55f", 0xa0}, {&(0x7f0000000480)="782180b5a1ac74d6dfef3f48408b6c8bc8332b6c397ec8cd38b3438508a5642537fd97507d1c97924e81acd6fcd107dd8faff16e8b2d4bcc7fa14e6bbbb065a4651393b696e9006892afc6275a89ad7fa300b436558bf3fa6ebed4c6969663cb471dd1716e40c3a2b44861f3622ca2a7e80d6663de1bff1db6302889c9ce88125d21b0702e878c75acc74b73fc4f0649c201659f9d67d5741b179ea56c08659b53615d98709f00451392e1772056f80e86267b306ca3ebe48ce61991c4955399425638b03255", 0xc6}, {&(0x7f0000000580)="a667d1a92bdeae68c284e62354b1e8c422cfe25e896c56e8369060eda8d8f2472d02d2b3b381253f20da27200331a1f9b53c4ee11279a8d968306ea399cc0c8cd29a3824905843be617e21aadb2ff4197a719eb3cab4235c3a2edbf7990e8340f57f479d51e29afb2ba2d207848eae0cb6b8f33616cca6111a9966373b1ee27c135313a5cd915a1440feea5210a3fc0dad03517405f538b00723a156dfc703d04ca4dec218f0544443061c113f86973183caedad85437310ea13e4cffba0f44ec6675725d7deb0cb2c986ec5df1c5eb0b63095293394551335c600a6", 0xdc}, {&(0x7f0000000680)="ea3700eda464b3578e6ccafb2dd5a2f4fccac78217ca702962b4bddf804810e1656319b0fb10fb7edd5fceef113ae9b09ce53a2f27c8dc11881f0baa12944d", 0x3f}, {&(0x7f00000006c0)="d52506a30ca713fad7be6f5ff248573ddb892f4a30ce5d0aa68c5441638e711dc9a59f2b2ee2995e60aee78b9e946c15481c71962ff41ed40fbe228a8fe37ca1deb9b3b7d35aae86c868e12ce598a360fdf3c8a8b6b10a4da7", 0x59}], 0x7, 0x100, 0x2, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:13:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 52) 00:13:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x9effffff, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1320.190351] journal_path: not usable as path [ 1320.190772] EXT4-fs: error: could not find journal device path [ 1320.198751] journal_path: not usable as path [ 1320.199160] EXT4-fs: error: could not find journal device path 00:13:41 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {}], 0x2, 0x9) 00:13:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:13:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:13:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 53) 00:13:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:13:41 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xf0ffffff, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:13:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'security.', 'mountinfo\x00'}) r2 = dup2(r1, r0) recvmsg$unix(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/127, 0x7f}], 0x1, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x51, 0x4, 0x40, 0xc7, 0x0, 0x0, 0x80000, 0x7, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x101, 0x4, @perf_bp={&(0x7f00000000c0), 0xc}, 0x10000, 0x3, 0x80, 0x2, 0x7, 0x401, 0x80, 0x0, 0xdcb2, 0x0, 0x1ff}, r3, 0x2, r2, 0x8) pwritev2(r2, &(0x7f0000000740)=[{&(0x7f0000000340)="12e1f570dbea569b7abafba51b538b4dab6b8b306322ed1f8a3c0fd5dee609fc825af178fce84ba0d145d38fcf828bb92217d06901067d6b1c", 0x39}, {&(0x7f0000000380)="0f362e9c0d0f28b8ce77bd55b094d13a0a684ab536454ec972c49b0737a069761be84efff8aaf2f218689d946403f4b7", 0x30}, {&(0x7f00000003c0)="9fa91930542d976450db6cf680d733976a4c652b431d78b76108936c790993c8551fb133d9b748262c70f8e04094b2552444833abc11a02e0e72496f64f5ad875d967d4c38ca86b12d21605dd023136950491c69f184f77e78e804c75f88768239719e9bda16ae4001e0b4b388886448140308a68b298e3906354c8920200774810a65ce70527c776bde3deb268e94f6c897feeaa41b4ed0a0cfb68fcea6e55f", 0xa0}, {&(0x7f0000000480)="782180b5a1ac74d6dfef3f48408b6c8bc8332b6c397ec8cd38b3438508a5642537fd97507d1c97924e81acd6fcd107dd8faff16e8b2d4bcc7fa14e6bbbb065a4651393b696e9006892afc6275a89ad7fa300b436558bf3fa6ebed4c6969663cb471dd1716e40c3a2b44861f3622ca2a7e80d6663de1bff1db6302889c9ce88125d21b0702e878c75acc74b73fc4f0649c201659f9d67d5741b179ea56c08659b53615d98709f00451392e1772056f80e86267b306ca3ebe48ce61991c4955399425638b03255", 0xc6}, {&(0x7f0000000580)="a667d1a92bdeae68c284e62354b1e8c422cfe25e896c56e8369060eda8d8f2472d02d2b3b381253f20da27200331a1f9b53c4ee11279a8d968306ea399cc0c8cd29a3824905843be617e21aadb2ff4197a719eb3cab4235c3a2edbf7990e8340f57f479d51e29afb2ba2d207848eae0cb6b8f33616cca6111a9966373b1ee27c135313a5cd915a1440feea5210a3fc0dad03517405f538b00723a156dfc703d04ca4dec218f0544443061c113f86973183caedad85437310ea13e4cffba0f44ec6675725d7deb0cb2c986ec5df1c5eb0b63095293394551335c600a6", 0xdc}, {&(0x7f0000000680)="ea3700eda464b3578e6ccafb2dd5a2f4fccac78217ca702962b4bddf804810e1656319b0fb10fb7edd5fceef113ae9b09ce53a2f27c8dc11881f0baa12944d", 0x3f}, {&(0x7f00000006c0)="d52506a30ca713fad7be6f5ff248573ddb892f4a30ce5d0aa68c5441638e711dc9a59f2b2ee2995e60aee78b9e946c15481c71962ff41ed40fbe228a8fe37ca1deb9b3b7d35aae86c868e12ce598a360fdf3c8a8b6b10a4da7", 0x59}], 0x7, 0x100, 0x2, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:13:41 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1329.873446] journal_path: not usable as path [ 1329.874132] EXT4-fs: error: could not find journal device path [ 1329.877599] journal_path: not usable as path [ 1329.877841] FAULT_INJECTION: forcing a failure. [ 1329.877841] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.877994] EXT4-fs: error: could not find journal device path [ 1329.879690] CPU: 1 UID: 0 PID: 10759 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1329.879722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.879735] Call Trace: [ 1329.879744] [ 1329.879753] dump_stack_lvl+0xfa/0x120 [ 1329.879783] should_fail_ex+0x4d7/0x5e0 [ 1329.879829] ? pidfs_register_pid+0x95/0x1a0 [ 1329.879854] should_failslab+0xc2/0x120 [ 1329.879878] kmem_cache_alloc_noprof+0x5f/0x470 [ 1329.879917] pidfs_register_pid+0x95/0x1a0 [ 1329.879944] pidfs_stash_dentry+0x62/0xc0 [ 1329.879969] ? __pfx_pidfs_stash_dentry+0x10/0x10 [ 1329.879995] path_from_stashed+0x428/0x660 [ 1329.880028] ? lock_release+0xc8/0x290 [ 1329.880059] pidfs_alloc_file+0x101/0x250 [ 1329.880084] ? __pfx_pidfs_alloc_file+0x10/0x10 [ 1329.880120] pidfd_prepare+0x117/0x1c0 [ 1329.880161] copy_process+0x3c4d/0x73e0 [ 1329.880211] ? __pfx_copy_process+0x10/0x10 [ 1329.880247] ? __might_fault+0xe0/0x190 [ 1329.880276] ? _copy_from_user+0x5b/0xd0 [ 1329.880309] kernel_clone+0xea/0x820 [ 1329.880343] ? get_pid_task+0xfd/0x250 [ 1329.880379] ? __pfx_kernel_clone+0x10/0x10 [ 1329.880422] ? find_held_lock+0x2b/0x80 [ 1329.880453] ? ksys_write+0x121/0x240 [ 1329.880487] ? lock_is_held_type+0x9e/0x120 [ 1329.880526] __do_sys_clone3+0x1f5/0x280 [ 1329.880547] ? __pfx___do_sys_clone3+0x10/0x10 [ 1329.880584] ? __fget_files+0x20d/0x3b0 [ 1329.880623] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1329.880658] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1329.880694] ? ksys_write+0x1a3/0x240 [ 1329.880727] ? __pfx_ksys_write+0x10/0x10 [ 1329.880770] do_syscall_64+0xbf/0x360 [ 1329.880795] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1329.880819] RIP: 0033:0x7f752ccf6b19 [ 1329.880837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.880860] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1329.880882] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1329.880898] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1329.880912] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.880926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1329.880940] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1329.880971] 00:13:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1329.939108] audit: type=1400 audit(1751501621.178:19): avc: denied { setattr } for pid=10758 comm="syz-executor.5" name="mountinfo" dev="proc" ino=28447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 00:13:41 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x9) 00:13:41 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) r4 = syz_mount_image$nfs4(&(0x7f0000006cc0), &(0x7f0000006d00)='./file0\x00', 0x101, 0x5, &(0x7f0000007f40)=[{&(0x7f0000006d40)="0d994c967fcca15c9c88d20a91653f0ef644fda6dc059b3c6bd5f3ef0fddb957e3e9eb6d1c4985b4f78222bd8829d4f942c0123fc46e4df71d74b366387df8d41058b4d21a00bb7e4800a4c4d91f3163c8725df93a7e21243061bcd58f4a93ee142b1ce67ec76fc71eec2dc999d36ced3bd77d269144a10ccbbcf252f65ce360ecf439af0ea25910aa61691b53dc5215cddf2a6e812f8523559278", 0x9b, 0x9}, {&(0x7f0000006e00)="a6b51455d4e4e244cbd23b4214e73f5a19cca202832192280c8a5feb6961cfa5288dc85d5dbb0cb4c5cbb8", 0x2b}, {&(0x7f0000006e40)="7e257e1021068cc7bf8039ca78973655947b6419cf25b0ea9e2b5e916111410a79a7c51acd0d62c38dd05965c361c5491990f2185793ed0db18c79b26754141749b9a819b5ced97b8cd4c3527a2c35378bfa29a439", 0x55, 0x40}, {&(0x7f0000006ec0)="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", 0x1000, 0x800}, {&(0x7f0000007ec0)="50b6282d80107e4124bd157fec9bde25470551208451936695621cae34022460b60ba1639290af39df7aac9f209469efde2e01b334a3cc60ef20ecb18e23b887edeecac1f00e9faa93180265a4afed1922dfc693aa386e40396856812f1c1cb95ca9a85e510537e9eb1349ffb94a562a9789f7756907fde6e6bb19d4", 0x7c, 0xfffffffffffffffe}], 0x5, &(0x7f0000007fc0)={[{'\x00'}, {'-#@'}, {'\x94{b(*-&%($'}, {'('}, {}], [{@dont_appraise}, {@appraise}, {@obj_type={'obj_type', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r5, 0x0, 0x0, 0x80800) r6 = getpid() pidfd_open(r6, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) fchown(r7, 0xffffffffffffffff, r9) fcntl$getownex(r0, 0x10, &(0x7f0000008040)={0x0, 0x0}) stat(&(0x7f0000008080)='./file0\x00', &(0x7f00000080c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getpid() pidfd_open(r12, 0x0) r13 = geteuid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008280)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000080)="520ea77c80d9e37c0d773c95ea959093cd90942f1a0552165480f4f8fef560ce43ca8845d3e61ef93bddccae734376f98c87fd05eeac403ec52bbbb625e76909aec5f397904f766bdfb73cefed3f64c90cdb20dcad1a4ce16c6f3313644805e2f8537ae04855a96c92b131712475828782e693b9f643", 0x76}, {&(0x7f00000001c0)="7c66a7dc118620d67b4164dec9fb67fb367f46976e18dd143b6dc00310c8f11808", 0x21}, {&(0x7f0000000200)="2f411577082a4115c71d9bae5890c9084a2e98d644863b5a6efc4b80b1916a4945f45e0211aec0bf1c02283f243384914b2e105310064d900457fa107ff3eebe88051f086542edf955e4e18906828c6ce933be2d4e2dfb9a", 0x58}, {&(0x7f0000000280)="f68f300adadb8b070d03e56a6ff9c678c03da11fd4888f290fb7173be1", 0x1d}], 0x4, &(0x7f0000000400)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x38, 0x4034}}, {{&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000004c0)="5fea5a2db5889cd791905f96c3be7a7de28e736d6e663f114c2c62551c7394b89461acdef41094eb77c22bbfe1ea9e76e9ef196984c3b4e1f6dde9981d2a8ad02861d040d65869f8a2636db2a312a9c16d4dc35618ffd8b7d3eff70dae445ad897787169207cc3961bc9b0f15a2a4af36ac40b61b6d16e91f5a2d4a4e160cfcd760b7a4c1060bbe67cc9507c06d40982f10c6e65aa633d95b1a5416013987b7d05e5c6173ee88c0aee20ab65c0e6a5bce89accd04505f6f241b3f6b0dac317a509c294d9c40fcc6d81", 0xc9}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f00000005c0)="3c6e9424227cdbbb04023cfb7e78127de3d27596169bf58b52a7598de5528412e121b1c4a9d487453599d55fc236fe0792a6662f0bd24459c653c3c333b02a475befd602107b49e8ea6f", 0x4a}, {&(0x7f0000000640)="425d35f699d0378f527e869d944526b9d859436f3a4b5346c1498616ab7d608b4064d397abfe3c39e02dab9863030817d69cf8f88c76e71cf00d8abf1cd1332cc191f274469625b092", 0x49}, {&(0x7f0000002540)="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", 0x1000}, {&(0x7f00000006c0)="bea14602a423c26ad16de64a55c4ce8e0447aadef06558290a75f5d76ff0ee253b17e105d2681a3caebaf7754566858641ec22112d22408886889812328b7e97c106100ec5de228e7b143453f0211f98b1307a082e1bc263ace22256b3cdeb82e1086146ba20b1e1de7db904f88cbda82466b411af2300446e4e47eb1c08810f4a577207968ccb38a53f9844d3f2f5fc41e46cae540343b011e5585684d454ce0369a2363c0d6970b12066b1b85521447e038885360369f7162e1e1cb43104a5768a7ce8f8f195619e0f02559bb6810950f751bf4b0a7c4cae6fe363895e45cbb36e859fe0d3e2843ff5f7118783d04b2480", 0xf2}], 0x6, &(0x7f0000000840)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020069aab20b042f9cc7c20000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0xee00, @ANYRES32, @ANYRES64, @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xf8, 0x40000}}, {{&(0x7f0000000e80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000f00)="4f6d652677a3282696a8a070ec02102d3e79d54c989dd8117209d090fb7018aa11a1c941e81bba937155ae69608a8e9635057c24f6ee5ddc90474eebc70fd38584f0acb2f0b268f326b9aa36eae26c7838afebb1dd96d581dc5f3612aa9ac82eb028a13ca489a8d4b0c955257a51d0874513ec26427ddba113df118030852637d9954c377348", 0x86}], 0x1, &(0x7f0000004cc0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000002000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd8, 0x20040000}}, {{&(0x7f0000004dc0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000005000)=[{&(0x7f0000004e40)="ac133778cff9d003b0317a33984fbeba599bc58c232564e95796572b92feb86cd874711463f7e980e12a7e33cde273731a12ceefc9f6742eb0ddd5577350ab5fde36094677ea95ecb84c305343a723ab89f7016f695b44c6d10fdb5d28088f3dce6f7376bc5e432aff5bffdf51aebff55864cff79f27bd43c26573210ee2e1a4a5da77a52ebf30711c32c0c0a41bfa706c6cd2ede80e80510afa87820e24b3ade49afe85c3efd9f7ce33959a1aff", 0xae}, {&(0x7f0000004f00)="8fe4ad1e919d1abc989aecbe7aca94f5e892bac2c8a1b529073aa2b47b1e1a8c668c0a9f4c2db90d6bc1ff5628cabc1d1ace15fd00ea0620f009a0699c15391020d01b0f8c9d634fc1902e40abb5307a0da212c54db0066b0bc8c36460ed66ff1dd3502b0538b14a9372f043604d4012b5174d4e8fe890274fb7a6cf1eb3245e63ab6134c586b4c46e209b9846490fa545eb3eb4240c41c75d392c1e6b13b9db188980e9f3f16713998cf9a6ef8275c45bd6f20fe0bffb30de45721481fd98c6", 0xc0}, {&(0x7f0000004fc0)="d467404e8b6e745f5d17c683434245e8f2196649e0e805ac59c420e21afc6707d62b84f122ee808342ef5cd91626f9336e6ae8ea60ce066268d4a34709af54", 0x3f}], 0x3, &(0x7f0000005140)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r1}}}], 0x50, 0x40000}}, {{0x0, 0x0, &(0x7f0000006380)=[{&(0x7f00000051c0)="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", 0x1000}, {&(0x7f00000061c0)="8c09f2fbc25d60273c90aa1622c3cd07e40be274a4bf752718010b57a9d29a772766152e3b14b13cc6ba14d9f07f1903030225d724a680957db79f9803c28f215c518264f5b9a23e35ed1613397178311d76b6e9021a444f409298a3a3150ce84fe9ee1509f1c0edaa49a55eed96121800613ee71c48a97d05e4044de60a8c686a119562a400773f9fde082f52a84dda23a24043b61b685334cdb14c1c1915c74ccc8e115de5b0a9a0030ed0b517548fc5e253cbf7ed6b996f90173932babc83b86658b9ec2163e097cc79a7ad6881b481a082258b1df05a4df3", 0xda}, {&(0x7f00000062c0)="b85fb7bc05ff81704deb79b3206708f7870d8ddbfea8f533a8f5f424a699353957ee76332d5b2db7d10b742ae0db1b4e5bba70ccecd14ce7619dc367f61fe096528a0d91bbf5bf87444cac62d583785a7ee0065e33c584a92540de34210965513f7b892d146dd88dd4c66c156853e48f5878b26f81a0e14893ce7a218cca6d3bc88748a2505713108f2524da2311d1d037ee9a0b9f3549aaf2f311ab11", 0x9d}], 0x3, &(0x7f0000006500)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r3]}}], 0x58, 0x4000000}}, {{&(0x7f0000006580)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000006740)=[{&(0x7f0000006600)="58adc2b72e1c807eebfafba189747a785006a1a0926457ffe986f8e40560e6904489df6ef6dd6e5ccdfad27cca5633885a39e62449c222d41380582f0cc231132831a5e1a298ca329d5a1bc7dd2d15f2c6347aede3bc084f0a1f7e0667b58b77ba29c3f9790bf18a94952624aec1a824222b8ab66a22bc21531737554b5ef998e99a824ef48077cf566844e18c45417d01304489e152055fbaa8373fec5a67efd47a890e68e93b6f4de7a6e2b8c73c67a33bbb6a41679bf271177a00fc04122ba1bee96ca7bfab4eb2313d511a6a10d095bc3b146c5d47968f754fb7c6e13cbd9c07adaa7fd9d10bf15303f0fe3302657421ffd08c", 0xf5}, {&(0x7f0000006700)="55c360b88d9fed2226450054", 0xc}], 0x10000233, &(0x7f0000000980)=ANY=[@ANYBLOB="38000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000d4d977d4cdd373f7a681c9b85e505d35d95194da80446881c3ee1e526476d38f47e4b0cd571e4fef49620a6dad7dad29b8c84a417ce5e42d317f155349c25cb111de8d4a2773e3c7e793e883e26edfae1bb0ba559956d0a2ec3cfc178bfeaef156a936c837a251c27f4aba77cc666a43454e0783b584f42d01e7c939729d77ef276f38e3639cf70879148271e3c30f70478e03263acb154d762881f5d2fa497da9514de5d06ef343faec02000000c0b94120ab07e03c7edee18128f02ad5a93bdda8c8f11479f6293c247bc784913bff127fefef380ef29955da17a0fc3c646bf535c41c45f60731f8080450e3d240a0"], 0x78, 0x4003}}, {{&(0x7f0000006900)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006c40)=[{&(0x7f0000006980)="2c3187ef5b0afabe36e305f5737e8dc7f8893a830841b8b2fa96ca14c9c9208bca381940f09f94466f4a2447fade24d247f592d77cbb55d96718f72ac4fcd66245f2fae58fccd60a4777825f8074373e77cb2d6729351f60e716da856635d779cbe0ff73f3ec7bf33b", 0x69}, {&(0x7f0000006a00)="18afc4bd56da31bacc046393d1123c98abdb31772f2f6afa6819d73a4e1fdfcb3a81b65bd77e8ba9a31b9d879977ddefe9eaf29e74e04e0333353ccde1fc8735b65dc0fb6aa2731ae4598afde066665f7b76cdc8db49166483cafb494de75d2a0c30428da22213afe4e12677a82543ab26ddfe656d3d120ec8f39513461ac75512d11676133aed270a9719259d26fc20e4ac069f43c6159387d19a4c62beb3a1ab4360a672be93ed005375836fccdafd402f5c1634172709c3561dcc943637b974dc3e1a9fb99a079f26964fc8bbac1ea896ab71ef", 0xd5}, {&(0x7f0000006b00)="f1fb5297ae1b4dd258dcfc0464d04dcf86916241e0d89a6b342c32eb7d9881fe0806226048e8a7d8bc8cded36ff796f83b59929a022bf865b3c95f28991158b917e261cc9019626676a8a7f4072bfabac67a7a0b763813ad4396c2cdcfc962cb7781c816204f8a4d9e0ff2a3ff7680a77ef127aa3b1b3339d7b8fa712bfadf9e5c6ab2b5a276dddabb9de202add615b602bfe8f2049493b1555e9b92eab9d285132c36ecafe4798494de124e9f5be5fae4561922df8b", 0xb6}, {&(0x7f0000006bc0)="3b89b1904607fa610acc47dd2121bf878f6e6dc09f89ac", 0x17}, {&(0x7f0000006c00)="5e3309b1040b5fb692666b3e0ab0c8250642879aa41f0c968cba8048fa3a", 0x1e}], 0x5, &(0x7f0000008140)=[@rights={{0x20, 0x1, 0x1, [r3, r3, r2, r3]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x20, 0x1, 0x1, [r3, r4, r5, r3]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r13, 0xee01}}}], 0x118, 0x4000010}}], 0x7, 0x4000004) poll(&(0x7f0000001480)=[{r2}, {r3}], 0x2, 0x9) 00:13:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 54) [ 1330.047644] loop4: detected capacity change from 0 to 16383 [ 1330.073164] loop4: detected capacity change from 0 to 16383 00:13:50 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:13:50 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}], 0x1, 0x9) 00:13:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:13:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 55) 00:13:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x5, 0x1b, 0x10e, &(0x7f00000001c0)}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:13:50 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:13:50 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xfffff000, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:13:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000440), 0x4) r3 = dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x210, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40081}, 0x840) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') r4 = pidfd_open(r0, 0x0) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) io_uring_register$IORING_REGISTER_BUFFERS(r6, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/195, 0xc3}, {&(0x7f0000000580)=""/121, 0x79}, {&(0x7f0000000600)=""/71, 0x47}], 0x3) poll(&(0x7f0000001480)=[{r4}, {r5}], 0x2, 0x9) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)=[{{&(0x7f0000000200)={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, '\x00', 0x25}, 0x2356}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000480)="ae2ee31763fa4e2312872ed420812dc4130966c7498236599539725d16d0fd39d9e03cc2e8451c17478f00d4f5a6accb51be4ffaa8fe526d7867bae9eefec6bf1ed8b2d946e52a5e3b5674e1e45e8743e8995d190a0734a6", 0x58}], 0x1}}], 0x1, 0x4000800) [ 1339.671406] FAULT_INJECTION: forcing a failure. [ 1339.671406] name failslab, interval 1, probability 0, space 0, times 0 [ 1339.672485] CPU: 0 UID: 0 PID: 10798 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1339.672502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1339.672509] Call Trace: [ 1339.672514] [ 1339.672518] dump_stack_lvl+0xfa/0x120 [ 1339.672537] should_fail_ex+0x4d7/0x5e0 [ 1339.672558] ? alloc_empty_file+0x58/0x1e0 [ 1339.672571] should_failslab+0xc2/0x120 [ 1339.672584] kmem_cache_alloc_noprof+0x5f/0x470 [ 1339.672600] ? _raw_spin_unlock_irq+0x23/0x40 [ 1339.672621] alloc_empty_file+0x58/0x1e0 [ 1339.672635] dentry_open+0x49/0xd0 [ 1339.672648] pidfs_alloc_file+0x16b/0x250 [ 1339.672662] ? __pfx_pidfs_alloc_file+0x10/0x10 [ 1339.672680] pidfd_prepare+0x117/0x1c0 [ 1339.672700] copy_process+0x3c4d/0x73e0 [ 1339.672725] ? __pfx_copy_process+0x10/0x10 [ 1339.672743] ? __might_fault+0xe0/0x190 [ 1339.672761] ? _copy_from_user+0x5b/0xd0 [ 1339.672778] kernel_clone+0xea/0x820 [ 1339.672800] ? get_pid_task+0xfd/0x250 [ 1339.672819] ? __pfx_kernel_clone+0x10/0x10 [ 1339.672840] ? find_held_lock+0x2b/0x80 [ 1339.672857] ? ksys_write+0x121/0x240 [ 1339.672874] ? lock_is_held_type+0x9e/0x120 [ 1339.672894] __do_sys_clone3+0x1f5/0x280 [ 1339.672904] ? __pfx___do_sys_clone3+0x10/0x10 [ 1339.672925] ? perf_trace_preemptirq_template+0x259/0x430 [ 1339.672945] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1339.672963] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1339.672982] ? __pfx_ksys_write+0x10/0x10 [ 1339.673003] do_syscall_64+0xbf/0x360 [ 1339.673017] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1339.673030] RIP: 0033:0x7f752ccf6b19 [ 1339.673039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1339.673051] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1339.673063] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1339.673071] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1339.673078] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1339.673085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1339.673092] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1339.673107] [ 1339.700149] journal_path: not usable as path [ 1339.701182] EXT4-fs: error: could not find journal device path [ 1339.709678] journal_path: not usable as path [ 1339.710477] EXT4-fs: error: could not find journal device path 00:13:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:13:50 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xffffff7f, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:13:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:13:51 executing program 4: r0 = gettid() perf_event_open(&(0x7f0000000140)={0xa0d440dc27a4d85f, 0x80, 0xf1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="01010000000000002e2f66696c653000fc659483aab1e5b008413f412ffc7c64aadb712917c605b442ac9c79dea1a1b008a796de6be830669e8078b4c3e39cfd08db4c2ba9c8b02b17db3df5243d0b7f3872c08e49cd81c95add49f1d9a4b4afba1eed8e225f157f3eb985acd229e7ffe9c46370bacb2f1eb4d0138284b0c1fbd8ee34fd1040ecabef4445a21026d7f65d32d3f2f0ad95c3cb16e95a7b313eef213b70a3846da6e71929ad1e69b73ba8bd0e33f1c0ae80b315afa94720a6e02c467cd923e01d1900f90fc7f28115542a1c91cf0ca49e2f8649f3510656bb"]) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pidfd_getfd(r3, r4, 0x0) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r2}, {r5}], 0x2, 0x9) fcntl$setlease(r4, 0x400, 0x2) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x40000) fsetxattr$trusted_overlay_upper(r6, &(0x7f0000000040), &(0x7f00000002c0)={0x0, 0xfb, 0xb2, 0x2, 0x1, "124dd8ecd753bd3cf25ad6491c7b832d", "5d7f4ef18feb7eb64c5b6b96e062e95ef95166bc2d914dedf39ca7ccd26328ac05ebaf1aebd6c14cd5c6f66b007a78ff6b324da5ca1d8c5d9f88bd69389546ba968f55596aba2901ab42f80418b1f696a8642d40113474c4288f7c8d29641d4a0aa55a4eef3f3eadc16a8a228714bfef4b39d81102bae36cf4795c5d8ee7affe96470dc58164065fba453d081241db45c61e167090a3dc3ac180ee363a"}, 0xb2, 0x0) 00:13:51 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:13:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 56) 00:13:51 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x5, 0x1b, 0x10e, &(0x7f00000001c0)}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:13:51 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}], 0x1, 0x9) 00:13:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ftruncate(r3, 0x1f) sendfile(r3, r2, 0x0, 0x800) 00:13:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xffffff9e, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1340.019129] journal_path: not usable as path [ 1340.019970] EXT4-fs: error: could not find journal device path 00:13:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1340.044245] journal_path: not usable as path [ 1340.045181] EXT4-fs: error: could not find journal device path 00:13:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 57) [ 1340.161490] FAULT_INJECTION: forcing a failure. [ 1340.161490] name failslab, interval 1, probability 0, space 0, times 0 [ 1340.163523] CPU: 0 UID: 0 PID: 10839 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1340.163554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1340.163567] Call Trace: [ 1340.163574] [ 1340.163582] dump_stack_lvl+0xfa/0x120 [ 1340.163612] should_fail_ex+0x4d7/0x5e0 [ 1340.163652] ? security_file_alloc+0x35/0x130 [ 1340.163676] should_failslab+0xc2/0x120 [ 1340.163698] kmem_cache_alloc_noprof+0x5f/0x470 [ 1340.163729] ? __create_object+0x59/0x80 [ 1340.163760] security_file_alloc+0x35/0x130 [ 1340.163783] init_file+0x95/0x4c0 [ 1340.163815] alloc_empty_file+0x76/0x1e0 [ 1340.163841] dentry_open+0x49/0xd0 [ 1340.163867] pidfs_alloc_file+0x16b/0x250 [ 1340.163893] ? __pfx_pidfs_alloc_file+0x10/0x10 [ 1340.163925] pidfd_prepare+0x117/0x1c0 [ 1340.163963] copy_process+0x3c4d/0x73e0 [ 1340.164010] ? __pfx_copy_process+0x10/0x10 [ 1340.164044] ? __might_fault+0xe0/0x190 [ 1340.164073] ? _copy_from_user+0x5b/0xd0 [ 1340.164105] kernel_clone+0xea/0x820 [ 1340.164137] ? get_pid_task+0xfd/0x250 [ 1340.164171] ? __pfx_kernel_clone+0x10/0x10 [ 1340.164211] ? find_held_lock+0x2b/0x80 [ 1340.164242] ? ksys_write+0x121/0x240 [ 1340.164272] ? lock_is_held_type+0x9e/0x120 [ 1340.164310] __do_sys_clone3+0x1f5/0x280 [ 1340.164329] ? __pfx___do_sys_clone3+0x10/0x10 [ 1340.164368] ? perf_trace_preemptirq_template+0x259/0x430 [ 1340.164405] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1340.164437] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1340.164473] ? __pfx_ksys_write+0x10/0x10 [ 1340.164513] do_syscall_64+0xbf/0x360 [ 1340.164538] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1340.164561] RIP: 0033:0x7f752ccf6b19 [ 1340.164578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1340.164599] RSP: 002b:00007f752a26c188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1340.164620] RAX: ffffffffffffffda RBX: 00007f752ce09f60 RCX: 00007f752ccf6b19 [ 1340.164635] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000240 [ 1340.164648] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1340.164661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1340.164675] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1340.164703] 00:14:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 58) 00:14:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:00 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xe0ffff00000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:14:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x9) 00:14:00 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}], 0x1, 0x9) 00:14:00 executing program 3: ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f00000001c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:14:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xfffffff0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:14:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000080)='map_files\x00') pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x6, 0x3, 0x20, 0x1f, 0x0, 0x9, 0xa8021, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x1064, 0x80000000, 0x34bc00, 0x8, 0x5, 0x10000009, 0x400, 0x0, 0x2}, r0, 0xd, r3, 0xb) r4 = pidfd_open(r0, 0x0) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0xe47, 0x10c}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r5}], 0x2, 0x9) r6 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r6, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) fcntl$setown(r6, 0x8, r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r8, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) 00:14:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1349.219635] journal_path: not usable as path [ 1349.220480] EXT4-fs: error: could not find journal device path [ 1349.231568] journal_path: not usable as path [ 1349.232369] EXT4-fs: error: could not find journal device path 00:14:00 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x0) 00:14:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 59) 00:14:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0xffffffff, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:14:00 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) r4 = syz_mount_image$nfs4(&(0x7f0000006cc0), &(0x7f0000006d00)='./file0\x00', 0x101, 0x5, &(0x7f0000007f40)=[{&(0x7f0000006d40)="0d994c967fcca15c9c88d20a91653f0ef644fda6dc059b3c6bd5f3ef0fddb957e3e9eb6d1c4985b4f78222bd8829d4f942c0123fc46e4df71d74b366387df8d41058b4d21a00bb7e4800a4c4d91f3163c8725df93a7e21243061bcd58f4a93ee142b1ce67ec76fc71eec2dc999d36ced3bd77d269144a10ccbbcf252f65ce360ecf439af0ea25910aa61691b53dc5215cddf2a6e812f8523559278", 0x9b, 0x9}, {&(0x7f0000006e00)="a6b51455d4e4e244cbd23b4214e73f5a19cca202832192280c8a5feb6961cfa5288dc85d5dbb0cb4c5cbb8", 0x2b}, {&(0x7f0000006e40)="7e257e1021068cc7bf8039ca78973655947b6419cf25b0ea9e2b5e916111410a79a7c51acd0d62c38dd05965c361c5491990f2185793ed0db18c79b26754141749b9a819b5ced97b8cd4c3527a2c35378bfa29a439", 0x55, 0x40}, {&(0x7f0000006ec0)="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", 0x1000, 0x800}, {&(0x7f0000007ec0)="50b6282d80107e4124bd157fec9bde25470551208451936695621cae34022460b60ba1639290af39df7aac9f209469efde2e01b334a3cc60ef20ecb18e23b887edeecac1f00e9faa93180265a4afed1922dfc693aa386e40396856812f1c1cb95ca9a85e510537e9eb1349ffb94a562a9789f7756907fde6e6bb19d4", 0x7c, 0xfffffffffffffffe}], 0x5, &(0x7f0000007fc0)={[{'\x00'}, {'-#@'}, {'\x94{b(*-&%($'}, {'('}, {}], [{@dont_appraise}, {@appraise}, {@obj_type={'obj_type', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r5, 0x0, 0x0, 0x80800) r6 = getpid() pidfd_open(r6, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) fchown(r7, 0xffffffffffffffff, r9) fcntl$getownex(r0, 0x10, &(0x7f0000008040)={0x0, 0x0}) stat(&(0x7f0000008080)='./file0\x00', &(0x7f00000080c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getpid() pidfd_open(r12, 0x0) r13 = geteuid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008280)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000080)="520ea77c80d9e37c0d773c95ea959093cd90942f1a0552165480f4f8fef560ce43ca8845d3e61ef93bddccae734376f98c87fd05eeac403ec52bbbb625e76909aec5f397904f766bdfb73cefed3f64c90cdb20dcad1a4ce16c6f3313644805e2f8537ae04855a96c92b131712475828782e693b9f643", 0x76}, {&(0x7f00000001c0)="7c66a7dc118620d67b4164dec9fb67fb367f46976e18dd143b6dc00310c8f11808", 0x21}, {&(0x7f0000000200)="2f411577082a4115c71d9bae5890c9084a2e98d644863b5a6efc4b80b1916a4945f45e0211aec0bf1c02283f243384914b2e105310064d900457fa107ff3eebe88051f086542edf955e4e18906828c6ce933be2d4e2dfb9a", 0x58}, {&(0x7f0000000280)="f68f300adadb8b070d03e56a6ff9c678c03da11fd4888f290fb7173be1", 0x1d}], 0x4, &(0x7f0000000400)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x38, 0x4034}}, {{&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000004c0)="5fea5a2db5889cd791905f96c3be7a7de28e736d6e663f114c2c62551c7394b89461acdef41094eb77c22bbfe1ea9e76e9ef196984c3b4e1f6dde9981d2a8ad02861d040d65869f8a2636db2a312a9c16d4dc35618ffd8b7d3eff70dae445ad897787169207cc3961bc9b0f15a2a4af36ac40b61b6d16e91f5a2d4a4e160cfcd760b7a4c1060bbe67cc9507c06d40982f10c6e65aa633d95b1a5416013987b7d05e5c6173ee88c0aee20ab65c0e6a5bce89accd04505f6f241b3f6b0dac317a509c294d9c40fcc6d81", 0xc9}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f00000005c0)="3c6e9424227cdbbb04023cfb7e78127de3d27596169bf58b52a7598de5528412e121b1c4a9d487453599d55fc236fe0792a6662f0bd24459c653c3c333b02a475befd602107b49e8ea6f", 0x4a}, {&(0x7f0000000640)="425d35f699d0378f527e869d944526b9d859436f3a4b5346c1498616ab7d608b4064d397abfe3c39e02dab9863030817d69cf8f88c76e71cf00d8abf1cd1332cc191f274469625b092", 0x49}, {&(0x7f0000002540)="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", 0x1000}, {&(0x7f00000006c0)="bea14602a423c26ad16de64a55c4ce8e0447aadef06558290a75f5d76ff0ee253b17e105d2681a3caebaf7754566858641ec22112d22408886889812328b7e97c106100ec5de228e7b143453f0211f98b1307a082e1bc263ace22256b3cdeb82e1086146ba20b1e1de7db904f88cbda82466b411af2300446e4e47eb1c08810f4a577207968ccb38a53f9844d3f2f5fc41e46cae540343b011e5585684d454ce0369a2363c0d6970b12066b1b85521447e038885360369f7162e1e1cb43104a5768a7ce8f8f195619e0f02559bb6810950f751bf4b0a7c4cae6fe363895e45cbb36e859fe0d3e2843ff5f7118783d04b2480", 0xf2}], 0x6, &(0x7f0000000840)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020069aab20b042f9cc7c20000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0xee00, @ANYRES32, @ANYRES64, @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xf8, 0x40000}}, {{&(0x7f0000000e80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000f00)="4f6d652677a3282696a8a070ec02102d3e79d54c989dd8117209d090fb7018aa11a1c941e81bba937155ae69608a8e9635057c24f6ee5ddc90474eebc70fd38584f0acb2f0b268f326b9aa36eae26c7838afebb1dd96d581dc5f3612aa9ac82eb028a13ca489a8d4b0c955257a51d0874513ec26427ddba113df118030852637d9954c377348", 0x86}], 0x1, &(0x7f0000004cc0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000002000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd8, 0x20040000}}, {{&(0x7f0000004dc0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000005000)=[{&(0x7f0000004e40)="ac133778cff9d003b0317a33984fbeba599bc58c232564e95796572b92feb86cd874711463f7e980e12a7e33cde273731a12ceefc9f6742eb0ddd5577350ab5fde36094677ea95ecb84c305343a723ab89f7016f695b44c6d10fdb5d28088f3dce6f7376bc5e432aff5bffdf51aebff55864cff79f27bd43c26573210ee2e1a4a5da77a52ebf30711c32c0c0a41bfa706c6cd2ede80e80510afa87820e24b3ade49afe85c3efd9f7ce33959a1aff", 0xae}, {&(0x7f0000004f00)="8fe4ad1e919d1abc989aecbe7aca94f5e892bac2c8a1b529073aa2b47b1e1a8c668c0a9f4c2db90d6bc1ff5628cabc1d1ace15fd00ea0620f009a0699c15391020d01b0f8c9d634fc1902e40abb5307a0da212c54db0066b0bc8c36460ed66ff1dd3502b0538b14a9372f043604d4012b5174d4e8fe890274fb7a6cf1eb3245e63ab6134c586b4c46e209b9846490fa545eb3eb4240c41c75d392c1e6b13b9db188980e9f3f16713998cf9a6ef8275c45bd6f20fe0bffb30de45721481fd98c6", 0xc0}, {&(0x7f0000004fc0)="d467404e8b6e745f5d17c683434245e8f2196649e0e805ac59c420e21afc6707d62b84f122ee808342ef5cd91626f9336e6ae8ea60ce066268d4a34709af54", 0x3f}], 0x3, &(0x7f0000005140)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r1}}}], 0x50, 0x40000}}, {{0x0, 0x0, &(0x7f0000006380)=[{&(0x7f00000051c0)="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", 0x1000}, {&(0x7f00000061c0)="8c09f2fbc25d60273c90aa1622c3cd07e40be274a4bf752718010b57a9d29a772766152e3b14b13cc6ba14d9f07f1903030225d724a680957db79f9803c28f215c518264f5b9a23e35ed1613397178311d76b6e9021a444f409298a3a3150ce84fe9ee1509f1c0edaa49a55eed96121800613ee71c48a97d05e4044de60a8c686a119562a400773f9fde082f52a84dda23a24043b61b685334cdb14c1c1915c74ccc8e115de5b0a9a0030ed0b517548fc5e253cbf7ed6b996f90173932babc83b86658b9ec2163e097cc79a7ad6881b481a082258b1df05a4df3", 0xda}, {&(0x7f00000062c0)="b85fb7bc05ff81704deb79b3206708f7870d8ddbfea8f533a8f5f424a699353957ee76332d5b2db7d10b742ae0db1b4e5bba70ccecd14ce7619dc367f61fe096528a0d91bbf5bf87444cac62d583785a7ee0065e33c584a92540de34210965513f7b892d146dd88dd4c66c156853e48f5878b26f81a0e14893ce7a218cca6d3bc88748a2505713108f2524da2311d1d037ee9a0b9f3549aaf2f311ab11", 0x9d}], 0x3, &(0x7f0000006500)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r3]}}], 0x58, 0x4000000}}, {{&(0x7f0000006580)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000006740)=[{&(0x7f0000006600)="58adc2b72e1c807eebfafba189747a785006a1a0926457ffe986f8e40560e6904489df6ef6dd6e5ccdfad27cca5633885a39e62449c222d41380582f0cc231132831a5e1a298ca329d5a1bc7dd2d15f2c6347aede3bc084f0a1f7e0667b58b77ba29c3f9790bf18a94952624aec1a824222b8ab66a22bc21531737554b5ef998e99a824ef48077cf566844e18c45417d01304489e152055fbaa8373fec5a67efd47a890e68e93b6f4de7a6e2b8c73c67a33bbb6a41679bf271177a00fc04122ba1bee96ca7bfab4eb2313d511a6a10d095bc3b146c5d47968f754fb7c6e13cbd9c07adaa7fd9d10bf15303f0fe3302657421ffd08c", 0xf5}, {&(0x7f0000006700)="55c360b88d9fed2226450054", 0xc}], 0x10000233, &(0x7f0000000980)=ANY=[@ANYBLOB="38000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000d4d977d4cdd373f7a681c9b85e505d35d95194da80446881c3ee1e526476d38f47e4b0cd571e4fef49620a6dad7dad29b8c84a417ce5e42d317f155349c25cb111de8d4a2773e3c7e793e883e26edfae1bb0ba559956d0a2ec3cfc178bfeaef156a936c837a251c27f4aba77cc666a43454e0783b584f42d01e7c939729d77ef276f38e3639cf70879148271e3c30f70478e03263acb154d762881f5d2fa497da9514de5d06ef343faec02000000c0b94120ab07e03c7edee18128f02ad5a93bdda8c8f11479f6293c247bc784913bff127fefef380ef29955da17a0fc3c646bf535c41c45f60731f8080450e3d240a0"], 0x78, 0x4003}}, {{&(0x7f0000006900)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006c40)=[{&(0x7f0000006980)="2c3187ef5b0afabe36e305f5737e8dc7f8893a830841b8b2fa96ca14c9c9208bca381940f09f94466f4a2447fade24d247f592d77cbb55d96718f72ac4fcd66245f2fae58fccd60a4777825f8074373e77cb2d6729351f60e716da856635d779cbe0ff73f3ec7bf33b", 0x69}, {&(0x7f0000006a00)="18afc4bd56da31bacc046393d1123c98abdb31772f2f6afa6819d73a4e1fdfcb3a81b65bd77e8ba9a31b9d879977ddefe9eaf29e74e04e0333353ccde1fc8735b65dc0fb6aa2731ae4598afde066665f7b76cdc8db49166483cafb494de75d2a0c30428da22213afe4e12677a82543ab26ddfe656d3d120ec8f39513461ac75512d11676133aed270a9719259d26fc20e4ac069f43c6159387d19a4c62beb3a1ab4360a672be93ed005375836fccdafd402f5c1634172709c3561dcc943637b974dc3e1a9fb99a079f26964fc8bbac1ea896ab71ef", 0xd5}, {&(0x7f0000006b00)="f1fb5297ae1b4dd258dcfc0464d04dcf86916241e0d89a6b342c32eb7d9881fe0806226048e8a7d8bc8cded36ff796f83b59929a022bf865b3c95f28991158b917e261cc9019626676a8a7f4072bfabac67a7a0b763813ad4396c2cdcfc962cb7781c816204f8a4d9e0ff2a3ff7680a77ef127aa3b1b3339d7b8fa712bfadf9e5c6ab2b5a276dddabb9de202add615b602bfe8f2049493b1555e9b92eab9d285132c36ecafe4798494de124e9f5be5fae4561922df8b", 0xb6}, {&(0x7f0000006bc0)="3b89b1904607fa610acc47dd2121bf878f6e6dc09f89ac", 0x17}, {&(0x7f0000006c00)="5e3309b1040b5fb692666b3e0ab0c8250642879aa41f0c968cba8048fa3a", 0x1e}], 0x5, &(0x7f0000008140)=[@rights={{0x20, 0x1, 0x1, [r3, r3, r2, r3]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x20, 0x1, 0x1, [r3, r4, r5, r3]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r13, 0xee01}}}], 0x118, 0x4000010}}], 0x7, 0x4000004) poll(&(0x7f0000001480)=[{r2}, {r3}], 0x2, 0x9) 00:14:00 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:14:00 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x0) [ 1349.398695] journal_path: not usable as path [ 1349.399734] EXT4-fs: error: could not find journal device path [ 1349.411317] journal_path: not usable as path [ 1349.411705] EXT4-fs: error: could not find journal device path [ 1349.434335] loop5: detected capacity change from 0 to 16383 [ 1357.909449] loop5: detected capacity change from 0 to 16383 00:14:09 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = getpid() pidfd_open(r2, 0x0) r3 = fork() r4 = pidfd_open(r3, 0x0) pidfd_open(r1, 0x0) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x85}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') poll(&(0x7f0000001480)=[{r4}, {r5}], 0x2, 0x9) 00:14:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 60) 00:14:09 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = fcntl$getown(r0, 0x9) rt_tgsigqueueinfo(r2, r1, 0x41, &(0x7f00000001c0)={0x10, 0x3, 0x7}) r3 = pidfd_open(r1, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x34, 0xd8, 0xff, 0x0, 0x8, 0x100, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xdb67, 0x0, @perf_config_ext={0x5, 0xff}, 0x1, 0x7fff, 0x79, 0x9, 0x4, 0x0, 0x6, 0x0, 0xfffffc01, 0x0, 0x9}, r1, 0x7, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r3, 0x4018f50b, &(0x7f0000000100)={0x1, 0x5, 0xecf}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) r7 = socket$nl_route(0x10, 0x3, 0x0) pidfd_getfd(r6, r7, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:14:09 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) r4 = syz_mount_image$nfs4(&(0x7f0000006cc0), &(0x7f0000006d00)='./file0\x00', 0x101, 0x5, &(0x7f0000007f40)=[{&(0x7f0000006d40)="0d994c967fcca15c9c88d20a91653f0ef644fda6dc059b3c6bd5f3ef0fddb957e3e9eb6d1c4985b4f78222bd8829d4f942c0123fc46e4df71d74b366387df8d41058b4d21a00bb7e4800a4c4d91f3163c8725df93a7e21243061bcd58f4a93ee142b1ce67ec76fc71eec2dc999d36ced3bd77d269144a10ccbbcf252f65ce360ecf439af0ea25910aa61691b53dc5215cddf2a6e812f8523559278", 0x9b, 0x9}, {&(0x7f0000006e00)="a6b51455d4e4e244cbd23b4214e73f5a19cca202832192280c8a5feb6961cfa5288dc85d5dbb0cb4c5cbb8", 0x2b}, {&(0x7f0000006e40)="7e257e1021068cc7bf8039ca78973655947b6419cf25b0ea9e2b5e916111410a79a7c51acd0d62c38dd05965c361c5491990f2185793ed0db18c79b26754141749b9a819b5ced97b8cd4c3527a2c35378bfa29a439", 0x55, 0x40}, {&(0x7f0000006ec0)="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", 0x1000, 0x800}, {&(0x7f0000007ec0)="50b6282d80107e4124bd157fec9bde25470551208451936695621cae34022460b60ba1639290af39df7aac9f209469efde2e01b334a3cc60ef20ecb18e23b887edeecac1f00e9faa93180265a4afed1922dfc693aa386e40396856812f1c1cb95ca9a85e510537e9eb1349ffb94a562a9789f7756907fde6e6bb19d4", 0x7c, 0xfffffffffffffffe}], 0x5, &(0x7f0000007fc0)={[{'\x00'}, {'-#@'}, {'\x94{b(*-&%($'}, {'('}, {}], [{@dont_appraise}, {@appraise}, {@obj_type={'obj_type', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r5, 0x0, 0x0, 0x80800) r6 = getpid() pidfd_open(r6, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) fchown(r7, 0xffffffffffffffff, r9) fcntl$getownex(r0, 0x10, &(0x7f0000008040)={0x0, 0x0}) stat(&(0x7f0000008080)='./file0\x00', &(0x7f00000080c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getpid() pidfd_open(r12, 0x0) r13 = geteuid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008280)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000080)="520ea77c80d9e37c0d773c95ea959093cd90942f1a0552165480f4f8fef560ce43ca8845d3e61ef93bddccae734376f98c87fd05eeac403ec52bbbb625e76909aec5f397904f766bdfb73cefed3f64c90cdb20dcad1a4ce16c6f3313644805e2f8537ae04855a96c92b131712475828782e693b9f643", 0x76}, {&(0x7f00000001c0)="7c66a7dc118620d67b4164dec9fb67fb367f46976e18dd143b6dc00310c8f11808", 0x21}, {&(0x7f0000000200)="2f411577082a4115c71d9bae5890c9084a2e98d644863b5a6efc4b80b1916a4945f45e0211aec0bf1c02283f243384914b2e105310064d900457fa107ff3eebe88051f086542edf955e4e18906828c6ce933be2d4e2dfb9a", 0x58}, {&(0x7f0000000280)="f68f300adadb8b070d03e56a6ff9c678c03da11fd4888f290fb7173be1", 0x1d}], 0x4, &(0x7f0000000400)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x38, 0x4034}}, {{&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000004c0)="5fea5a2db5889cd791905f96c3be7a7de28e736d6e663f114c2c62551c7394b89461acdef41094eb77c22bbfe1ea9e76e9ef196984c3b4e1f6dde9981d2a8ad02861d040d65869f8a2636db2a312a9c16d4dc35618ffd8b7d3eff70dae445ad897787169207cc3961bc9b0f15a2a4af36ac40b61b6d16e91f5a2d4a4e160cfcd760b7a4c1060bbe67cc9507c06d40982f10c6e65aa633d95b1a5416013987b7d05e5c6173ee88c0aee20ab65c0e6a5bce89accd04505f6f241b3f6b0dac317a509c294d9c40fcc6d81", 0xc9}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f00000005c0)="3c6e9424227cdbbb04023cfb7e78127de3d27596169bf58b52a7598de5528412e121b1c4a9d487453599d55fc236fe0792a6662f0bd24459c653c3c333b02a475befd602107b49e8ea6f", 0x4a}, {&(0x7f0000000640)="425d35f699d0378f527e869d944526b9d859436f3a4b5346c1498616ab7d608b4064d397abfe3c39e02dab9863030817d69cf8f88c76e71cf00d8abf1cd1332cc191f274469625b092", 0x49}, {&(0x7f0000002540)="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", 0x1000}, {&(0x7f00000006c0)="bea14602a423c26ad16de64a55c4ce8e0447aadef06558290a75f5d76ff0ee253b17e105d2681a3caebaf7754566858641ec22112d22408886889812328b7e97c106100ec5de228e7b143453f0211f98b1307a082e1bc263ace22256b3cdeb82e1086146ba20b1e1de7db904f88cbda82466b411af2300446e4e47eb1c08810f4a577207968ccb38a53f9844d3f2f5fc41e46cae540343b011e5585684d454ce0369a2363c0d6970b12066b1b85521447e038885360369f7162e1e1cb43104a5768a7ce8f8f195619e0f02559bb6810950f751bf4b0a7c4cae6fe363895e45cbb36e859fe0d3e2843ff5f7118783d04b2480", 0xf2}], 0x6, &(0x7f0000000840)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020069aab20b042f9cc7c20000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0xee00, @ANYRES32, @ANYRES64, @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xf8, 0x40000}}, {{&(0x7f0000000e80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000f00)="4f6d652677a3282696a8a070ec02102d3e79d54c989dd8117209d090fb7018aa11a1c941e81bba937155ae69608a8e9635057c24f6ee5ddc90474eebc70fd38584f0acb2f0b268f326b9aa36eae26c7838afebb1dd96d581dc5f3612aa9ac82eb028a13ca489a8d4b0c955257a51d0874513ec26427ddba113df118030852637d9954c377348", 0x86}], 0x1, &(0x7f0000004cc0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000002000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd8, 0x20040000}}, {{&(0x7f0000004dc0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000005000)=[{&(0x7f0000004e40)="ac133778cff9d003b0317a33984fbeba599bc58c232564e95796572b92feb86cd874711463f7e980e12a7e33cde273731a12ceefc9f6742eb0ddd5577350ab5fde36094677ea95ecb84c305343a723ab89f7016f695b44c6d10fdb5d28088f3dce6f7376bc5e432aff5bffdf51aebff55864cff79f27bd43c26573210ee2e1a4a5da77a52ebf30711c32c0c0a41bfa706c6cd2ede80e80510afa87820e24b3ade49afe85c3efd9f7ce33959a1aff", 0xae}, {&(0x7f0000004f00)="8fe4ad1e919d1abc989aecbe7aca94f5e892bac2c8a1b529073aa2b47b1e1a8c668c0a9f4c2db90d6bc1ff5628cabc1d1ace15fd00ea0620f009a0699c15391020d01b0f8c9d634fc1902e40abb5307a0da212c54db0066b0bc8c36460ed66ff1dd3502b0538b14a9372f043604d4012b5174d4e8fe890274fb7a6cf1eb3245e63ab6134c586b4c46e209b9846490fa545eb3eb4240c41c75d392c1e6b13b9db188980e9f3f16713998cf9a6ef8275c45bd6f20fe0bffb30de45721481fd98c6", 0xc0}, {&(0x7f0000004fc0)="d467404e8b6e745f5d17c683434245e8f2196649e0e805ac59c420e21afc6707d62b84f122ee808342ef5cd91626f9336e6ae8ea60ce066268d4a34709af54", 0x3f}], 0x3, &(0x7f0000005140)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r1}}}], 0x50, 0x40000}}, {{0x0, 0x0, &(0x7f0000006380)=[{&(0x7f00000051c0)="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", 0x1000}, {&(0x7f00000061c0)="8c09f2fbc25d60273c90aa1622c3cd07e40be274a4bf752718010b57a9d29a772766152e3b14b13cc6ba14d9f07f1903030225d724a680957db79f9803c28f215c518264f5b9a23e35ed1613397178311d76b6e9021a444f409298a3a3150ce84fe9ee1509f1c0edaa49a55eed96121800613ee71c48a97d05e4044de60a8c686a119562a400773f9fde082f52a84dda23a24043b61b685334cdb14c1c1915c74ccc8e115de5b0a9a0030ed0b517548fc5e253cbf7ed6b996f90173932babc83b86658b9ec2163e097cc79a7ad6881b481a082258b1df05a4df3", 0xda}, {&(0x7f00000062c0)="b85fb7bc05ff81704deb79b3206708f7870d8ddbfea8f533a8f5f424a699353957ee76332d5b2db7d10b742ae0db1b4e5bba70ccecd14ce7619dc367f61fe096528a0d91bbf5bf87444cac62d583785a7ee0065e33c584a92540de34210965513f7b892d146dd88dd4c66c156853e48f5878b26f81a0e14893ce7a218cca6d3bc88748a2505713108f2524da2311d1d037ee9a0b9f3549aaf2f311ab11", 0x9d}], 0x3, &(0x7f0000006500)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r3]}}], 0x58, 0x4000000}}, {{&(0x7f0000006580)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000006740)=[{&(0x7f0000006600)="58adc2b72e1c807eebfafba189747a785006a1a0926457ffe986f8e40560e6904489df6ef6dd6e5ccdfad27cca5633885a39e62449c222d41380582f0cc231132831a5e1a298ca329d5a1bc7dd2d15f2c6347aede3bc084f0a1f7e0667b58b77ba29c3f9790bf18a94952624aec1a824222b8ab66a22bc21531737554b5ef998e99a824ef48077cf566844e18c45417d01304489e152055fbaa8373fec5a67efd47a890e68e93b6f4de7a6e2b8c73c67a33bbb6a41679bf271177a00fc04122ba1bee96ca7bfab4eb2313d511a6a10d095bc3b146c5d47968f754fb7c6e13cbd9c07adaa7fd9d10bf15303f0fe3302657421ffd08c", 0xf5}, {&(0x7f0000006700)="55c360b88d9fed2226450054", 0xc}], 0x10000233, &(0x7f0000000980)=ANY=[@ANYBLOB="38000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000d4d977d4cdd373f7a681c9b85e505d35d95194da80446881c3ee1e526476d38f47e4b0cd571e4fef49620a6dad7dad29b8c84a417ce5e42d317f155349c25cb111de8d4a2773e3c7e793e883e26edfae1bb0ba559956d0a2ec3cfc178bfeaef156a936c837a251c27f4aba77cc666a43454e0783b584f42d01e7c939729d77ef276f38e3639cf70879148271e3c30f70478e03263acb154d762881f5d2fa497da9514de5d06ef343faec02000000c0b94120ab07e03c7edee18128f02ad5a93bdda8c8f11479f6293c247bc784913bff127fefef380ef29955da17a0fc3c646bf535c41c45f60731f8080450e3d240a0"], 0x78, 0x4003}}, {{&(0x7f0000006900)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006c40)=[{&(0x7f0000006980)="2c3187ef5b0afabe36e305f5737e8dc7f8893a830841b8b2fa96ca14c9c9208bca381940f09f94466f4a2447fade24d247f592d77cbb55d96718f72ac4fcd66245f2fae58fccd60a4777825f8074373e77cb2d6729351f60e716da856635d779cbe0ff73f3ec7bf33b", 0x69}, {&(0x7f0000006a00)="18afc4bd56da31bacc046393d1123c98abdb31772f2f6afa6819d73a4e1fdfcb3a81b65bd77e8ba9a31b9d879977ddefe9eaf29e74e04e0333353ccde1fc8735b65dc0fb6aa2731ae4598afde066665f7b76cdc8db49166483cafb494de75d2a0c30428da22213afe4e12677a82543ab26ddfe656d3d120ec8f39513461ac75512d11676133aed270a9719259d26fc20e4ac069f43c6159387d19a4c62beb3a1ab4360a672be93ed005375836fccdafd402f5c1634172709c3561dcc943637b974dc3e1a9fb99a079f26964fc8bbac1ea896ab71ef", 0xd5}, {&(0x7f0000006b00)="f1fb5297ae1b4dd258dcfc0464d04dcf86916241e0d89a6b342c32eb7d9881fe0806226048e8a7d8bc8cded36ff796f83b59929a022bf865b3c95f28991158b917e261cc9019626676a8a7f4072bfabac67a7a0b763813ad4396c2cdcfc962cb7781c816204f8a4d9e0ff2a3ff7680a77ef127aa3b1b3339d7b8fa712bfadf9e5c6ab2b5a276dddabb9de202add615b602bfe8f2049493b1555e9b92eab9d285132c36ecafe4798494de124e9f5be5fae4561922df8b", 0xb6}, {&(0x7f0000006bc0)="3b89b1904607fa610acc47dd2121bf878f6e6dc09f89ac", 0x17}, {&(0x7f0000006c00)="5e3309b1040b5fb692666b3e0ab0c8250642879aa41f0c968cba8048fa3a", 0x1e}], 0x5, &(0x7f0000008140)=[@rights={{0x20, 0x1, 0x1, [r3, r3, r2, r3]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x20, 0x1, 0x1, [r3, r4, r5, r3]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r13, 0xee01}}}], 0x118, 0x4000010}}], 0x7, 0x4000004) poll(&(0x7f0000001480)=[{r2}, {r3}], 0x2, 0x9) 00:14:09 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x6, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:14:09 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x0) 00:14:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:09 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:14:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 61) 00:14:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000080)='map_files\x00') pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x6, 0x3, 0x20, 0x1f, 0x0, 0x9, 0xa8021, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x1064, 0x80000000, 0x34bc00, 0x8, 0x5, 0x10000009, 0x400, 0x0, 0x2}, r0, 0xd, r3, 0xb) r4 = pidfd_open(r0, 0x0) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0xe47, 0x10c}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r5}], 0x2, 0x9) r6 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r6, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) fcntl$setown(r6, 0x8, r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r8, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) 00:14:09 executing program 3: msgrcv(0x0, &(0x7f00000001c0)={0x0, ""/255}, 0x107, 0x3, 0x1000) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)=0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1358.004982] journal_path: not usable as path [ 1358.005919] EXT4-fs: error: could not find journal device path [ 1358.016166] journal_path: not usable as path [ 1358.017203] EXT4-fs: error: could not find journal device path 00:14:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 62) 00:14:17 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = getpgrp(r0) r3 = getpid() pidfd_open(r3, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3, 0x4, 0x4, 0x1, 0x0, 0xfff, 0x181, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1b9, 0x0, @perf_config_ext={0x100000001, 0x40}, 0x1e8, 0x8001, 0x1000, 0x0, 0xffff, 0x800, 0x1, 0x0, 0x0, 0x0, 0x2}, r3, 0x1, r4, 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3, 0x7, 0x0, 0x81, 0x0, 0x81, 0x20, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xb87, 0x5}, 0x40200, 0x9, 0x1f, 0x4, 0x80000001, 0x8000, 0xffc1, 0x0, 0x5, 0x0, 0x7fff}, r2, 0xf, 0xffffffffffffffff, 0xa) pidfd_open(r2, 0x0) r7 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r7}], 0x2, 0x9) 00:14:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x200900, 0x20) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x4e23, @empty}}, 0x0, 0x0, 0x4a, 0x0, "a6fa07286da4c541a2619152f7250ede7186a936e29f302aa8f16a48b12db17d9580772fb140e42c2d93e1ea1fdcad206928f8509e61cd60a3633bd65b9cc3a3d1b4ec628da56732ef5a46708d844f83"}, 0xd8) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:14:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000080)='map_files\x00') pidfd_open(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x6, 0x3, 0x20, 0x1f, 0x0, 0x9, 0xa8021, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x1064, 0x80000000, 0x34bc00, 0x8, 0x5, 0x10000009, 0x400, 0x0, 0x2}, r0, 0xd, r3, 0xb) r4 = pidfd_open(r0, 0x0) r5 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0xe47, 0x10c}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r4}, {r5}], 0x2, 0x9) r6 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r6, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) fcntl$setown(r6, 0x8, r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r8, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) 00:14:17 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0xf, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:14:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000000), 0x0) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:14:17 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1366.151503] journal_path: not usable as path [ 1366.151951] EXT4-fs: error: could not find journal device path [ 1366.157131] journal_path: not usable as path [ 1366.157489] EXT4-fs: error: could not find journal device path 00:14:17 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:14:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000080)}, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:14:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x36, &(0x7f0000001540)=ANY=[@ANYBLOB='\x00\b\x00\x00\x00\x00\x00\x00'], 0x8) setsockopt$inet6_opts(r2, 0x29, 0x39, 0x0, 0x0) r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r3}], 0x2, 0x9) 00:14:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x9) [ 1366.241594] journal_path: not usable as path [ 1366.242114] EXT4-fs: error: could not find journal device path [ 1366.251301] journal_path: not usable as path [ 1366.251661] EXT4-fs: error: could not find journal device path 00:14:17 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = getpgrp(r0) r3 = getpid() pidfd_open(r3, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3, 0x4, 0x4, 0x1, 0x0, 0xfff, 0x181, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1b9, 0x0, @perf_config_ext={0x100000001, 0x40}, 0x1e8, 0x8001, 0x1000, 0x0, 0xffff, 0x800, 0x1, 0x0, 0x0, 0x0, 0x2}, r3, 0x1, r4, 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3, 0x7, 0x0, 0x81, 0x0, 0x81, 0x20, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xb87, 0x5}, 0x40200, 0x9, 0x1f, 0x4, 0x80000001, 0x8000, 0xffc1, 0x0, 0x5, 0x0, 0x7fff}, r2, 0xf, 0xffffffffffffffff, 0xa) pidfd_open(r2, 0x0) r7 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r7}], 0x2, 0x9) 00:14:17 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:14:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 63) 00:14:17 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:14:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = getpid() pidfd_open(r1, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x4c, 0x2, 0x62, 0x0, 0x0, 0xffff, 0x10, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext={0x2, 0x8}, 0x10001, 0x7f, 0x80000001, 0x1, 0x6, 0x3, 0x5, 0x0, 0xffff7fff, 0x0, 0x400}, r1, 0xa, r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = getpid() pidfd_open(r3, 0x0) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x81800) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x9, 0x2, 0x8, 0x0, 0x5, 0x800, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x101}, 0x80, 0x100, 0x984, 0x2, 0x6, 0x4, 0x7ff, 0x0, 0x4, 0x0, 0x8000}, r3, 0x1, r4, 0x0) dup2(r2, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:14:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_bp={0x0}, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x7f59, &(0x7f0000000040)={0x0, 0xfffffffc, 0x0, 0xfffffffc, 0x84}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000000)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) [ 1366.362600] journal_path: not usable as path [ 1366.363014] EXT4-fs: error: could not find journal device path [ 1366.371414] journal_path: not usable as path [ 1366.371769] EXT4-fs: error: could not find journal device path [ 1366.391767] FAULT_INJECTION: forcing a failure. [ 1366.391767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1366.393706] CPU: 0 UID: 0 PID: 10971 Comm: syz-executor.1 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1366.393731] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1366.393742] Call Trace: [ 1366.393748] [ 1366.393754] dump_stack_lvl+0xfa/0x120 [ 1366.393779] should_fail_ex+0x4d7/0x5e0 [ 1366.393816] _copy_to_user+0x32/0xd0 [ 1366.393840] simple_read_from_buffer+0xe0/0x180 [ 1366.393865] proc_fail_nth_read+0x189/0x270 [ 1366.393892] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1366.393918] ? security_file_permission+0x22/0x90 [ 1366.393940] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1366.393965] vfs_read+0x1eb/0xbe0 [ 1366.393996] ? __pfx_vfs_read+0x10/0x10 [ 1366.394026] ? lock_release+0xc8/0x290 [ 1366.394048] ? __fget_files+0x20d/0x3b0 [ 1366.394081] ksys_read+0x121/0x240 [ 1366.394105] ? __pfx_ksys_read+0x10/0x10 [ 1366.394137] do_syscall_64+0xbf/0x360 [ 1366.394157] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1366.394175] RIP: 0033:0x7f752cca969c [ 1366.394188] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1366.394205] RSP: 002b:00007f752a26c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1366.394223] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f752cca969c [ 1366.394235] RDX: 000000000000000f RSI: 00007f752a26c1e0 RDI: 0000000000000004 [ 1366.394245] RBP: 00007f752a26c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1366.394256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1366.394265] R13: 00007ffe8a544cef R14: 00007f752a26c300 R15: 0000000000022000 [ 1366.394290] 00:14:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:14:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x9) 00:14:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x180, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:14:26 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:14:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r1, 0x0, 0x0, 0x80800) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) dup2(r2, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r3, 0x0, 0x0, 0x80800) pread64(r3, &(0x7f0000000080)=""/76, 0x4c, 0x2) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:14:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) pidfd_send_signal(r3, 0x5, &(0x7f0000000000)={0x3, 0x38, 0xffffffff}, 0x0) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:14:26 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) [ 1374.791437] journal_path: not usable as path [ 1374.791967] EXT4-fs: error: could not find journal device path [ 1374.795652] journal_path: not usable as path [ 1374.796218] EXT4-fs: error: could not find journal device path 00:14:26 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:14:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x4e20, @empty}}, 0x0, 0x0, 0x4b, 0x0, "04e0a83561b01f920ccfc0b767c1b8a79a24d1db013e5b02a78ff762f6467d81a72b940c650a57f0e750a837a045169c82f11202a63fae991de38cd5aaf22b13b0313a8a81dc2597158b53f674493e1d"}, 0xd8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1374.888070] journal_path: not usable as path [ 1374.888554] EXT4-fs: error: could not find journal device path 00:14:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x9) [ 1374.892631] journal_path: not usable as path [ 1374.893089] EXT4-fs: error: could not find journal device path 00:14:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001102, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:14:43 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x80c000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:14:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x2, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:14:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:14:43 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:43 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x4000000, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) r5 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0xf8, 0x1, 0x4, 0x4, 0x0, 0x93a, 0x85140, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0xffff, 0x3}, 0x8000, 0x3, 0xf6, 0x2, 0x800, 0x6, 0x7f, 0x0, 0x200000, 0x0, 0x101}, 0xffffffffffffffff, 0x8, r3, 0x3) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/suspend_stats', 0x8000, 0x141) r9 = socket$inet(0x2, 0x80005, 0x3ac0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r5, &(0x7f00000001c0)={r8, r9, 0x2}) dup2(r7, r6) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r2) 00:14:43 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x33fe0, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:14:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001103, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:14:43 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2, 0x6400}], 0x2, 0x9) [ 1391.933132] journal_path: not usable as path [ 1391.933883] EXT4-fs: error: could not find journal device path [ 1391.943316] journal_path: not usable as path [ 1391.944068] EXT4-fs: error: could not find journal device path 00:14:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001104, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:14:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) 00:14:43 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x90c000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:14:43 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:43 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r1, 0x18}, {r3, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:43 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0x81, 0x7f, 0x1, 0x0, 0x800, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7ff, 0x3}, 0x781c, 0x1, 0x6, 0x7, 0xffffffff, 0x2, 0xbc6, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x0, r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:14:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') tee(r0, r0, 0x80000001, 0xb) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r2, 0x0, 0x0, 0x80800) fcntl$setsig(r2, 0xa, 0x41) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:14:43 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0xfffffdef, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) [ 1392.146696] journal_path: not usable as path [ 1392.147328] EXT4-fs: error: could not find journal device path 00:14:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}], 0x3, 0x9) [ 1392.161637] journal_path: not usable as path [ 1392.162399] EXT4-fs: error: could not find journal device path 00:14:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001109, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:14:43 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) [ 1392.365746] journal_path: not usable as path [ 1392.366551] EXT4-fs: error: could not find journal device path [ 1392.369141] journal_path: not usable as path [ 1392.370245] EXT4-fs: error: could not find journal device path 00:14:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x2, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:14:51 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:14:51 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x1300000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:14:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001110, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:14:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {}], 0x4, 0x9) 00:14:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = pidfd_open(0x0, 0x0) r1 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}, {r1}], 0x2, 0x9) 00:14:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_snmp6\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:14:51 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e, 0x10, 0x1, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {r0, 0x8}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1400.572307] journal_path: not usable as path [ 1400.572737] EXT4-fs: error: could not find journal device path [ 1400.576278] journal_path: not usable as path [ 1400.576681] EXT4-fs: error: could not find journal device path 00:14:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001111, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:14:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x9, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:14:51 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:14:51 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') tee(r0, r0, 0x80000001, 0xb) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r2, 0x0, 0x0, 0x80800) fcntl$setsig(r2, 0xa, 0x41) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:14:51 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x9) (fail_nth: 1) 00:14:51 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') dup2(r1, r0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:14:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) getpid() 00:14:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {}], 0x4, 0x9) [ 1400.714416] journal_path: not usable as path [ 1400.715093] EXT4-fs: error: could not find journal device path [ 1400.720202] FAULT_INJECTION: forcing a failure. [ 1400.720202] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1400.721217] CPU: 1 UID: 0 PID: 11107 Comm: syz-executor.7 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1400.721233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1400.721240] Call Trace: [ 1400.721244] [ 1400.721249] dump_stack_lvl+0xfa/0x120 [ 1400.721267] should_fail_ex+0x4d7/0x5e0 [ 1400.721289] _copy_from_user+0x30/0xd0 [ 1400.721305] do_sys_poll+0x1b3/0xd90 [ 1400.721325] ? trace_mm_page_alloc+0xfc/0x150 [ 1400.721341] ? __pfx_do_sys_poll+0x10/0x10 [ 1400.721356] ? tracing_gen_ctx_irq_test+0x167/0x1f0 [ 1400.721376] ? perf_swevent_event+0x63/0x3f0 [ 1400.721393] ? perf_tp_event+0x807/0xe70 [ 1400.721411] ? __pfx_perf_tp_event+0x10/0x10 [ 1400.721427] ? __might_fault+0xe0/0x190 [ 1400.721438] ? tracing_gen_ctx_irq_test+0x167/0x1f0 [ 1400.721459] ? perf_tp_event+0x807/0xe70 [ 1400.721473] ? __lock_acquire+0x694/0x1b70 [ 1400.721489] ? __pfx_perf_tp_event+0x10/0x10 [ 1400.721505] ? lock_acquire+0x15e/0x2f0 [ 1400.721516] ? get_pid_task+0x29/0x250 [ 1400.721535] ? get_pid_task+0xfd/0x250 [ 1400.721551] ? lock_release+0xc8/0x290 [ 1400.721570] ? __lock_acquire+0xc65/0x1b70 [ 1400.721584] ? lock_release+0xc8/0x290 [ 1400.721595] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1400.721615] ? lock_acquire+0x15e/0x2f0 [ 1400.721627] ? find_held_lock+0x2b/0x80 [ 1400.721644] ? timespec64_add_safe+0x18c/0x210 [ 1400.721661] ? __pfx_timespec64_add_safe+0x10/0x10 [ 1400.721687] ? ktime_get_ts64+0x292/0x360 [ 1400.721703] ? read_tsc+0x9/0x20 [ 1400.721718] ? ktime_get_ts64+0x216/0x360 [ 1400.721735] __x64_sys_poll+0x192/0x480 [ 1400.721751] ? __pfx___x64_sys_poll+0x10/0x10 [ 1400.721771] do_syscall_64+0xbf/0x360 [ 1400.721785] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1400.721801] RIP: 0033:0x7ff157f84b19 [ 1400.721810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1400.721825] RSP: 002b:00007ff1554fa188 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 1400.721836] RAX: ffffffffffffffda RBX: 00007ff158097f60 RCX: 00007ff157f84b19 [ 1400.721844] RDX: 0000000000000009 RSI: 0000000000000001 RDI: 0000000020001480 [ 1400.721851] RBP: 00007ff1554fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1400.721858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1400.721865] R13: 00007ffe30f02a6f R14: 00007ff1554fa300 R15: 0000000000022000 [ 1400.721881] [ 1400.743612] journal_path: not usable as path [ 1400.744007] EXT4-fs: error: could not find journal device path [ 1408.350931] Bluetooth: hci5: command 0x0406 tx timeout 00:15:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:15:01 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x9) (fail_nth: 2) 00:15:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8}, {}], 0x4, 0x9) 00:15:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3c, 0x40, 0x6, 0x1, 0x0, 0x3, 0x1d800, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x3ff, 0x7}, 0x10000, 0x8000, 0xb, 0x5, 0x6, 0x1, 0x9, 0x0, 0x5, 0x0, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xb) r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x52, 0x91, 0x5, 0x3, 0x0, 0x4, 0x80040, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x3f, 0xffffffff8bbdba7a}, 0x1010, 0xfff, 0x0, 0x8, 0x2, 0xec, 0x4e, 0x0, 0x5d8, 0x0, 0x817}, 0x0, 0x4, r3, 0x0) 00:15:01 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x18, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:15:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000080)) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:15:01 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:15:01 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') tee(r0, r0, 0x80000001, 0xb) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r2, 0x0, 0x0, 0x80800) fcntl$setsig(r2, 0xa, 0x41) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1409.994513] journal_path: not usable as path [ 1409.995473] EXT4-fs: error: could not find journal device path 00:15:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') dup2(0xffffffffffffffff, r0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x141000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000000c0)={'veth1_to_bond\x00', @random}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:15:01 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x28, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:15:01 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0xbe, 0xf1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() futex(0x0, 0x5, 0x0, 0x0, 0x0, 0x0) r1 = getpid() pidfd_open(r1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x4080, 0x0) ioctl$KDDELIO(r4, 0x4b35, 0x7) accept4(r3, 0x0, 0x0, 0x80800) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r5) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r5, r0, 0xb3f}) r7 = syz_io_uring_setup(0x32b6, &(0x7f00000014c0)={0x0, 0x4000000, 0x10, 0x0, 0x83}, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{}, {r7}], 0x2, 0x9) [ 1410.019520] FAULT_INJECTION: forcing a failure. [ 1410.019520] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1410.021424] CPU: 1 UID: 0 PID: 11135 Comm: syz-executor.7 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1410.021454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1410.021467] Call Trace: [ 1410.021475] [ 1410.021483] dump_stack_lvl+0xfa/0x120 [ 1410.021512] should_fail_ex+0x4d7/0x5e0 [ 1410.021553] _copy_to_user+0x32/0xd0 [ 1410.021582] simple_read_from_buffer+0xe0/0x180 [ 1410.021615] proc_fail_nth_read+0x189/0x270 [ 1410.021649] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1410.021682] ? security_file_permission+0x22/0x90 [ 1410.021710] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1410.021741] vfs_read+0x1eb/0xbe0 [ 1410.021791] ? __pfx_vfs_read+0x10/0x10 [ 1410.021829] ? lock_release+0xc8/0x290 [ 1410.021857] ? __fget_files+0x20d/0x3b0 [ 1410.021897] ksys_read+0x121/0x240 [ 1410.021927] ? __pfx_ksys_read+0x10/0x10 [ 1410.021967] do_syscall_64+0xbf/0x360 [ 1410.021992] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1410.022014] RIP: 0033:0x7ff157f3769c [ 1410.022031] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1410.022052] RSP: 002b:00007ff1554fa170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1410.022073] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff157f3769c [ 1410.022088] RDX: 000000000000000f RSI: 00007ff1554fa1e0 RDI: 0000000000000005 [ 1410.022101] RBP: 00007ff1554fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1410.022114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1410.022127] R13: 00007ffe30f02a6f R14: 00007ff1554fa300 R15: 0000000000022000 [ 1410.022156] 00:15:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) [ 1410.059197] journal_path: not usable as path [ 1410.060941] EXT4-fs: error: could not find journal device path 00:15:10 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:15:10 executing program 4: r0 = getpgid(0x0) r1 = getpid() pidfd_open(r1, 0x0) tgkill(r0, r1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) syz_open_dev$vcsu(&(0x7f0000000000), 0x4fc, 0x80000) r4 = syz_io_uring_setup(0x40022b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r3}, {r4}], 0x2, 0x9) 00:15:10 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) 00:15:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3c, 0x40, 0x6, 0x1, 0x0, 0x3, 0x1d800, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x3ff, 0x7}, 0x10000, 0x8000, 0xb, 0x5, 0x6, 0x1, 0x9, 0x0, 0x5, 0x0, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xb) r1 = pidfd_open(r0, 0x0) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x52, 0x91, 0x5, 0x3, 0x0, 0x4, 0x80040, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x3f, 0xffffffff8bbdba7a}, 0x1010, 0xfff, 0x0, 0x8, 0x2, 0xec, 0x4e, 0x0, 0x5d8, 0x0, 0x817}, 0x0, 0x4, r3, 0x0) 00:15:10 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x2400000000000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:15:10 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x9) 00:15:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:15:10 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x2}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1419.027646] journal_path: not usable as path [ 1419.028123] EXT4-fs: error: could not find journal device path [ 1419.030760] journal_path: not usable as path [ 1419.031165] EXT4-fs: error: could not find journal device path 00:15:10 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:15:10 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}], 0x1, 0x9) 00:15:10 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {0xffffffffffffffff, 0x8000}], 0x3, 0x9) 00:15:10 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e24, 0x5, @private1, 0x2}}, 0x0, 0x0, 0x1b, 0x0, "545b51a96e2af9f74d3563ee3ddf0f788fc07005af6a2057a5024e8caae704d4a055c3cf3848b002f4df5264acaa48a0716c9dfc778097f7a85e705d260c7cfbbe4157ddd78a5b3e912ba84492070bd3"}, 0xd8) dup2(r1, r0) syz_emit_ethernet(0x7a, &(0x7f0000000180)={@local, @empty, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1a2685", 0x44, 0x2f, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @private0, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}}, 0x0) r4 = socket$inet6(0xa, 0xd, 0x9) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x80000, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1419.110209] journal_path: not usable as path [ 1419.111075] EXT4-fs: error: could not find journal device path [ 1419.118227] journal_path: not usable as path [ 1419.118600] EXT4-fs: error: could not find journal device path 00:15:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = pidfd_open(r0, 0x0) tgkill(0x0, r0, 0x2) r2 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r1}, {r2}], 0x2, 0x9) 00:15:10 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:15:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}, {0xffffffffffffffff, 0x8000}], 0x2, 0x9) (fail_nth: 1) 00:15:10 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x2, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:15:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:15:10 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0, 0x8}], 0x1, 0x9) 00:15:10 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40300, 0x0, 0x1000, 0x0, 0x7fff}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f0000000080)={0x1, 0x3, 0xe}) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xffffffff, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xfff, &(0x7f0000000040)=0x0) io_submit(r3, 0x1, &(0x7f0000000800)=[&(0x7f00000001c0)={0x0, 0x0, 0x8, 0x0, 0x0, r2, 0x0}]) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) [ 1419.230722] journal_path: not usable as path [ 1419.231567] EXT4-fs: error: could not find journal device path [ 1419.255781] journal_path: not usable as path [ 1419.258144] EXT4-fs: error: could not find journal device path [ 1419.284619] FAULT_INJECTION: forcing a failure. [ 1419.284619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1419.286538] CPU: 1 UID: 0 PID: 11196 Comm: syz-executor.5 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1419.286570] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1419.286584] Call Trace: [ 1419.286592] [ 1419.286601] dump_stack_lvl+0xfa/0x120 [ 1419.286630] should_fail_ex+0x4d7/0x5e0 [ 1419.286670] _copy_from_user+0x30/0xd0 [ 1419.286702] do_sys_poll+0x1b3/0xd90 [ 1419.286740] ? trace_mm_page_alloc+0xfc/0x150 [ 1419.286768] ? __pfx_do_sys_poll+0x10/0x10 [ 1419.286813] ? _parse_integer_limit+0x181/0x1e0 [ 1419.286854] ? _kstrtoull+0x13e/0x200 [ 1419.286886] ? __pfx__kstrtoull+0x10/0x10 [ 1419.286922] ? __might_fault+0xe0/0x190 [ 1419.286947] ? find_held_lock+0x2b/0x80 [ 1419.286984] ? __lock_acquire+0x694/0x1b70 [ 1419.287019] ? lock_acquire+0x15e/0x2f0 [ 1419.287042] ? get_pid_task+0x29/0x250 [ 1419.287075] ? find_held_lock+0x2b/0x80 [ 1419.287106] ? get_pid_task+0xfd/0x250 [ 1419.287138] ? lock_release+0xc8/0x290 [ 1419.287166] ? get_pid_task+0x107/0x250 [ 1419.287199] ? proc_fail_nth_write+0x98/0x250 [ 1419.287257] ? __lock_acquire+0xc65/0x1b70 [ 1419.287302] ? lock_release+0xc8/0x290 [ 1419.287329] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1419.287368] ? lock_acquire+0x15e/0x2f0 [ 1419.287391] ? find_held_lock+0x2b/0x80 [ 1419.287421] ? timespec64_add_safe+0x18c/0x210 [ 1419.287454] ? __pfx_timespec64_add_safe+0x10/0x10 [ 1419.287487] ? ktime_get_ts64+0x292/0x360 [ 1419.287514] ? read_tsc+0x9/0x20 [ 1419.287540] ? ktime_get_ts64+0x216/0x360 [ 1419.287572] __x64_sys_poll+0x192/0x480 [ 1419.287604] ? __pfx___x64_sys_poll+0x10/0x10 [ 1419.287646] do_syscall_64+0xbf/0x360 [ 1419.287671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1419.287695] RIP: 0033:0x7fa3b5f39b19 [ 1419.287712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1419.287735] RSP: 002b:00007fa3b34af188 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 1419.287758] RAX: ffffffffffffffda RBX: 00007fa3b604cf60 RCX: 00007fa3b5f39b19 [ 1419.287773] RDX: 0000000000000009 RSI: 0000000000000002 RDI: 0000000020001480 [ 1419.287787] RBP: 00007fa3b34af1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1419.287801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1419.287815] R13: 00007ffeed5a638f R14: 00007fa3b34af300 R15: 0000000000022000 [ 1419.287846] [ 1419.322878] ================================================================== [ 1419.324016] BUG: KASAN: slab-use-after-free in flush_tlb_func+0x24d/0x560 [ 1419.325087] Write of size 8 at addr ffff88803d71c700 by task syz-executor.5/11196 [ 1419.326283] [ 1419.326563] CPU: 1 UID: 0 PID: 11196 Comm: syz-executor.5 Not tainted 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1419.326594] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1419.326607] Call Trace: [ 1419.326616] [ 1419.326625] dump_stack_lvl+0xca/0x120 [ 1419.326649] print_report+0xcb/0x670 [ 1419.326676] ? __virt_addr_valid+0x100/0x5d0 [ 1419.326709] ? flush_tlb_func+0x24d/0x560 [ 1419.326744] ? flush_tlb_func+0x24d/0x560 [ 1419.326781] kasan_report+0xca/0x100 [ 1419.326808] ? flush_tlb_func+0x24d/0x560 [ 1419.326846] kasan_check_range+0x39/0x1b0 [ 1419.326877] flush_tlb_func+0x24d/0x560 [ 1419.326913] ? lock_acquire+0x15e/0x2f0 [ 1419.326938] ? __pfx_flush_tlb_func+0x10/0x10 [ 1419.326973] __flush_smp_call_function_queue+0x20d/0x740 [ 1419.327011] __sysvec_call_function_single+0x6d/0x360 [ 1419.327048] sysvec_call_function_single+0x5f/0xc0 [ 1419.327084] asm_sysvec_call_function_single+0x1a/0x20 [ 1419.327111] RIP: 0010:handle_softirqs+0x174/0x770 [ 1419.327145] Code: c8 83 83 3c 0a 00 00 01 c7 44 24 20 0a 00 00 00 48 89 44 24 18 65 66 c7 05 cf b4 47 06 00 00 e8 42 6b 40 00 fb bb ff ff ff ff <48> c7 c5 c0 c0 a0 85 41 0f bc de 83 c3 01 0f 85 9b 00 00 00 e9 8d [ 1419.327169] RSP: 0018:ffff88806cf08f78 EFLAGS: 00000212 [ 1419.327188] RAX: 00000000000001d0 RBX: 00000000ffffffff RCX: ffffffff817bc5c6 [ 1419.327207] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff813b5b6e [ 1419.327229] RBP: ffff8880301ef818 R08: 0000000000000001 R09: 0000000000000001 [ 1419.327250] R10: ffffffff86439057 R11: 0000000000000001 R12: 0000000000000000 [ 1419.327268] R13: 0000000000000000 R14: 0000000000000302 R15: 0000000000000000 [ 1419.327287] ? trace_irq_enable.constprop.0+0x26/0x100 [ 1419.327324] ? handle_softirqs+0x16e/0x770 [ 1419.327356] ? handle_softirqs+0x16e/0x770 [ 1419.327391] __irq_exit_rcu+0xc4/0x100 [ 1419.327422] irq_exit_rcu+0x9/0x20 [ 1419.327452] sysvec_apic_timer_interrupt+0x70/0x80 [ 1419.327487] [ 1419.327494] [ 1419.327502] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1419.327527] RIP: 0010:dump_stack_lvl+0x115/0x120 [ 1419.327550] Code: fc ff ff 4c 89 e2 31 f6 31 ff e8 26 31 7b fc e8 e1 e7 a4 fc 48 89 ee 31 ff e8 f7 8b c4 fc e8 92 90 c4 fc e8 9d ba cc fc fb 5b <5d> 41 5c e9 83 90 c4 fc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 [ 1419.327572] RSP: 0018:ffff8880301ef8c0 EFLAGS: 00000202 [ 1419.327589] RAX: 00000000000001cd RBX: ffffffff85e96fe0 RCX: ffffffff817bc5c6 [ 1419.327605] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff84af0c13 [ 1419.327620] RBP: 0000000000000200 R08: 0000000000000001 R09: 0000000000000001 [ 1419.327635] R10: ffffffff86439057 R11: 0000000000000001 R12: ffffffff8530fc40 [ 1419.327650] R13: ffffffff85e96ff0 R14: 0000000000000000 R15: 0000000000000000 [ 1419.327669] ? trace_irq_enable.constprop.0+0x26/0x100 [ 1419.327705] ? dump_stack_lvl+0x113/0x120 [ 1419.327728] should_fail_ex+0x4d7/0x5e0 [ 1419.327766] _copy_from_user+0x30/0xd0 [ 1419.327794] do_sys_poll+0x1b3/0xd90 [ 1419.327827] ? trace_mm_page_alloc+0xfc/0x150 [ 1419.327853] ? __pfx_do_sys_poll+0x10/0x10 [ 1419.327887] ? _parse_integer_limit+0x181/0x1e0 [ 1419.327924] ? _kstrtoull+0x13e/0x200 [ 1419.327957] ? __pfx__kstrtoull+0x10/0x10 [ 1419.327992] ? __might_fault+0xe0/0x190 [ 1419.328016] ? find_held_lock+0x2b/0x80 [ 1419.328050] ? __lock_acquire+0x694/0x1b70 [ 1419.328079] ? lock_acquire+0x15e/0x2f0 [ 1419.328102] ? get_pid_task+0x29/0x250 [ 1419.328136] ? find_held_lock+0x2b/0x80 [ 1419.328167] ? get_pid_task+0xfd/0x250 [ 1419.328201] ? lock_release+0xc8/0x290 [ 1419.328237] ? get_pid_task+0x107/0x250 [ 1419.328276] ? proc_fail_nth_write+0x98/0x250 [ 1419.328312] ? __lock_acquire+0xc65/0x1b70 [ 1419.328339] ? lock_release+0xc8/0x290 [ 1419.328362] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1419.328399] ? lock_acquire+0x15e/0x2f0 [ 1419.328423] ? find_held_lock+0x2b/0x80 [ 1419.328454] ? timespec64_add_safe+0x18c/0x210 [ 1419.328487] ? __pfx_timespec64_add_safe+0x10/0x10 [ 1419.328520] ? ktime_get_ts64+0x292/0x360 [ 1419.328546] ? read_tsc+0x9/0x20 [ 1419.328573] ? ktime_get_ts64+0x216/0x360 [ 1419.328602] __x64_sys_poll+0x192/0x480 [ 1419.328634] ? __pfx___x64_sys_poll+0x10/0x10 [ 1419.328671] do_syscall_64+0xbf/0x360 [ 1419.328695] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1419.328719] RIP: 0033:0x7fa3b5f39b19 [ 1419.328736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1419.328758] RSP: 002b:00007fa3b34af188 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 1419.328780] RAX: ffffffffffffffda RBX: 00007fa3b604cf60 RCX: 00007fa3b5f39b19 [ 1419.328796] RDX: 0000000000000009 RSI: 0000000000000002 RDI: 0000000020001480 [ 1419.328811] RBP: 00007fa3b34af1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1419.328826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1419.328841] R13: 00007ffeed5a638f R14: 00007fa3b34af300 R15: 0000000000022000 [ 1419.328864] [ 1419.328872] [ 1419.405039] Allocated by task 287: [ 1419.405632] kasan_save_stack+0x24/0x50 [ 1419.406287] kasan_save_track+0x14/0x30 [ 1419.406920] __kasan_slab_alloc+0x59/0x70 [ 1419.407583] kmem_cache_alloc_noprof+0x13c/0x470 [ 1419.408364] copy_process+0x6f3a/0x73e0 [ 1419.409017] kernel_clone+0xea/0x820 [ 1419.409649] __do_sys_clone+0xce/0x120 [ 1419.410285] do_syscall_64+0xbf/0x360 [ 1419.410896] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1419.411717] [ 1419.411996] Freed by task 11192: [ 1419.412555] kasan_save_stack+0x24/0x50 [ 1419.413182] kasan_save_track+0x14/0x30 [ 1419.413853] kasan_save_free_info+0x3a/0x60 [ 1419.414550] __kasan_slab_free+0x38/0x50 [ 1419.415184] kmem_cache_free+0x2a1/0x460 [ 1419.415843] mmput+0x305/0x390 [ 1419.416388] do_exit+0x79d/0x2970 [ 1419.416950] do_group_exit+0xd3/0x2a0 [ 1419.417576] get_signal+0x2315/0x2340 [ 1419.418208] arch_do_signal_or_restart+0x80/0x790 [ 1419.419002] exit_to_user_mode_loop+0x8b/0x100 [ 1419.419757] do_syscall_64+0x2f7/0x360 [ 1419.420371] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1419.421197] [ 1419.421484] The buggy address belongs to the object at ffff88803d71bd80 [ 1419.421484] which belongs to the cache mm_struct of size 2456 [ 1419.423410] The buggy address is located 2432 bytes inside of [ 1419.423410] freed 2456-byte region [ffff88803d71bd80, ffff88803d71c718) [ 1419.425310] [ 1419.425584] The buggy address belongs to the physical page: [ 1419.426458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3d718 [ 1419.427683] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1419.428861] memcg:ffff88800b77c181 [ 1419.429416] anon flags: 0x100000000000040(head|node=0|zone=1) [ 1419.430342] page_type: f5(slab) [ 1419.430868] raw: 0100000000000040 ffff888008c4bc80 0000000000000000 dead000000000001 [ 1419.432066] raw: 0000000000000000 00000000800c000c 00000000f5000000 ffff88800b77c181 [ 1419.433302] head: 0100000000000040 ffff888008c4bc80 0000000000000000 dead000000000001 [ 1419.434630] head: 0000000000000000 00000000800c000c 00000000f5000000 ffff88800b77c181 [ 1419.435852] head: 0100000000000003 ffffea0000f5c601 00000000ffffffff 00000000ffffffff [ 1419.437074] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000008 [ 1419.438313] page dumped because: kasan: bad access detected [ 1419.439171] [ 1419.439454] Memory state around the buggy address: [ 1419.440197] ffff88803d71c600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1419.441357] ffff88803d71c680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1419.442486] >ffff88803d71c700: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1419.443634] ^ [ 1419.444163] ffff88803d71c780: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 1419.445294] ffff88803d71c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1419.446428] ================================================================== [ 1419.447541] Disabling lock debugging due to kernel taint 00:15:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x28, r1, 0x1, 0x3, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) 00:15:18 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000001600)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x80, 0xd, 0x6, 0x101, 0x0, 0x0, {0xf, 0x0, 0x8}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x20) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = syz_io_uring_setup(0x2ab6, &(0x7f00000014c0)={0x0, 0x0, 0x10, 0x0, 0x83}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f0000001380)=[{&(0x7f0000000040)=""/113, 0x71}, {&(0x7f0000000140)=""/254, 0xfe}, {&(0x7f00000000c0)=""/62, 0x3e}, {&(0x7f0000000240)=""/48, 0x30}, {&(0x7f0000000280)=""/1, 0x1}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x7) sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0xffffffff) poll(&(0x7f0000001480)=[{r2}, {r3}], 0x2, 0x9) 00:15:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) 00:15:18 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:15:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0, 0x64}], 0x1, 0x9) 00:15:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:15:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0)={0x0, 0xae9e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0}, {0xffffffffffffffff, 0x8000}], 0x2, 0x9) (fail_nth: 2) 00:15:18 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x4, 0xcf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x42945, 0x2, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000080)=')&-}$\x00') 00:15:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x30001100, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:15:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001480)=[{}, {0xffffffffffffffff, 0x18}, {}, {0xffffffffffffffff, 0x8000}], 0x4, 0x9) [ 1427.727387] journal_path: not usable as path [ 1427.728024] EXT4-fs: error: could not find journal device path [ 1427.733094] journal_path: not usable as path [ 1427.733461] EXT4-fs: error: could not find journal device path [ 1427.754196] FAULT_INJECTION: forcing a failure. [ 1427.754196] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1427.756132] CPU: 0 UID: 0 PID: 11228 Comm: syz-executor.5 Tainted: G B 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 1427.756169] Tainted: [B]=BAD_PAGE [ 1427.756177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1427.756190] Call Trace: [ 1427.756198] [ 1427.756206] dump_stack_lvl+0xfa/0x120 [ 1427.756234] should_fail_ex+0x4d7/0x5e0 [ 1427.756271] _copy_to_user+0x32/0xd0 [ 1427.756299] simple_read_from_buffer+0xe0/0x180 [ 1427.756329] proc_fail_nth_read+0x189/0x270 [ 1427.756362] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1427.756395] ? security_file_permission+0x22/0x90 [ 1427.756421] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1427.756453] vfs_read+0x1eb/0xbe0 [ 1427.756487] ? __pfx_vfs_read+0x10/0x10 [ 1427.756519] ? lock_release+0x1c7/0x290 [ 1427.756545] ? __fget_files+0x20d/0x3b0 [ 1427.756580] ksys_read+0x121/0x240 [ 1427.756611] ? __pfx_ksys_read+0x10/0x10 [ 1427.756649] do_syscall_64+0xbf/0x360 [ 1427.756673] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1427.756697] RIP: 0033:0x7fa3b5eec69c [ 1427.756714] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1427.756736] RSP: 002b:00007fa3b34af170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1427.756759] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa3b5eec69c [ 1427.756774] RDX: 000000000000000f RSI: 00007fa3b34af1e0 RDI: 0000000000000005 [ 1427.756788] RBP: 00007fa3b34af1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1427.756809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1427.756823] R13: 00007ffeed5a638f R14: 00007fa3b34af300 R15: 0000000000022000 [ 1427.756845] 00:15:19 executing program 6: syz_mount_image$ext4(&(0x7f0000002580)='ext2\x00', &(0x7f00000025c0)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='journal_path']) 00:15:19 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x22b6, &(0x7f00000014c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001440)) poll(&(0x7f0000001480)=[{r0, 0x58a}], 0x1, 0x9) [ 1427.814145] journal_path: not usable as path [ 1427.814543] EXT4-fs: error: could not find journal device path [ 1427.817322] journal_path: not usable as path [ 1427.817709] EXT4-fs: error: could not find journal device path VM DIAGNOSIS: 00:15:10 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffff88801541fa90 RCX=ffff88801541f4fc RDX=0000000000000000 RSI=ffffffff85c1ccc0 RDI=ffff888013acdcd8 RBP=ffff888015418000 RSP=ffff88801541f520 R8 =0000000000000001 R9 =ffff88801541f5e8 R10=000000000003bb04 R11=000000000003e692 R12=ffff88801541f601 R13=ffff88801541f5f0 R14=ffff88801541fa78 R15=ffff88801541f5a8 RIP=ffffffff815bb3e8 RFL=00000282 [--S----] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fbda8da4900 00000000 00000000 GS =0000 ffff8880e55ef000 00000000 00000000 LDT=0000 fffffe4f00000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fbda83e8000 CR3=000000000d8e1000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffffffffffff XMM01=30306234386136303638616663356134 XMM02=38303062343861363036386166633561 XMM03=2f6c616e72756f6a2f676f6c2f6e7572 XMM04=1067e2c26c959b37000000000036e508 XMM05=d3fdd5f48436fbd700000000000aead0 XMM06=c4ee9ec2c4b4268d00000000000ae988 XMM07=00000000000000000000000000000000 XMM08=44495f474f4c5359530069253d595449 XMM09=00000000000000000000000000000000 XMM10=00200000000000000020000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff828ba3e5 RDI=ffffffff88722060 RBP=ffffffff88722020 RSP=ffff88806cf08838 R8 =0000000000000000 R9 =ffffed10014ea046 R10=0000000000000030 R11=303178302f303120 R12=0000000000000030 R13=0000000000000010 R14=ffffffff88722020 R15=ffffffff828ba3d0 RIP=ffffffff828ba43d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fa3b34af700 00000000 00000000 GS =0000 ffff8880e56ef000 00000000 00000000 LDT=0000 fffffe0e00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa3b34aef78 CR3=000000002c447000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=ffffffffffffffffffffffffffffff00 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000