100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:55:49 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0x0, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:55:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 832.759571] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 832.761653] EXT4-fs (loop5): mount failed 04:55:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:55:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:55:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:55:49 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0x0, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:55:49 executing program 0: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:55:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:55:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 833.051068] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 833.051663] EXT4-fs (loop5): mount failed 04:55:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:55:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:56:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:56:04 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0x0, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 848.263803] audit: type=1326 audit(1713761764.679:155): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6933 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2a4ebdbb19 code=0x0 04:56:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:56:04 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) fork() 04:56:04 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:56:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:56:04 executing program 0: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0x0, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:56:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, 0x0, 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 848.296465] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 848.297450] EXT4-fs (loop5): mount failed 04:56:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:56:04 executing program 0: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:56:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:56:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, 0x0, 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:56:04 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600"}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:56:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:56:04 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:56:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 848.564215] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 848.566588] EXT4-fs (loop5): get root inode failed [ 848.567384] EXT4-fs (loop5): mount failed 04:56:19 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) fork() 04:56:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:56:19 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600"}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:56:19 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:56:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 862.892690] audit: type=1326 audit(1713761779.308:156): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6990 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2a4ebdbb19 code=0x0 04:56:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, 0x0, 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:56:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:56:19 executing program 0: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:56:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 862.979768] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 863.014498] EXT4-fs (loop5): get root inode failed [ 863.015308] EXT4-fs (loop5): mount failed 04:56:19 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600"}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:56:19 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:56:36 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) fork() 04:56:36 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:56:36 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, 0x0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 879.811791] audit: type=1326 audit(1713761796.227:157): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7037 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2a4ebdbb19 code=0x0 04:56:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:56:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:56:36 executing program 0: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600"}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:56:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:56:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:56:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 879.896577] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 879.897835] EXT4-fs (loop5): get root inode failed [ 879.898270] EXT4-fs (loop5): mount failed 04:56:36 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:56:36 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, 0x0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:56:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:56:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:56:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 880.029126] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 880.034787] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:56:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:56:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 880.184671] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 880.186491] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:56:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:56:51 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 04:56:51 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, 0x0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:56:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:56:51 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:56:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:56:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:56:51 executing program 0: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 895.376113] audit: type=1326 audit(1713761811.791:158): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7101 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2a4ebdbb19 code=0x0 04:56:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:56:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 895.432660] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 895.436215] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:56:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:56:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {0x0, 0x0, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:56:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:56:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:56:52 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:56:52 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(0x0, &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:56:52 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 895.766959] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 895.781441] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:57:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {0x0, 0x0, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:57:05 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() [ 908.710349] audit: type=1326 audit(1713761825.126:159): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7165 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2a4ebdbb19 code=0x0 04:57:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:57:05 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:57:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:57:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:57:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:05 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(0x0, &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 908.823424] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 908.828870] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:57:05 executing program 0: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(0x0, &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:57:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:57:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:57:05 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:57:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {0x0, 0x0, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:57:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:57:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:57:05 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 909.244402] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 909.259310] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:57:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:57:18 executing program 0: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, 0x0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:57:18 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 04:57:18 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:57:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:57:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:18 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(0x0, &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:57:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500), 0x0, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 922.144654] audit: type=1326 audit(1713761838.560:160): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7234 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2a4ebdbb19 code=0x0 04:57:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 922.166751] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 922.187344] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:57:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500), 0x0, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:57:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:57:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 922.364755] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 04:57:18 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 922.398645] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:57:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500), 0x0, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 922.530779] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 922.536293] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:57:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x0) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:34 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:57:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x201, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:57:34 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:57:34 executing program 0: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(0x0, &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:57:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:57:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:57:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 937.877158] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 937.885160] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:57:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:57:34 executing program 2: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:57:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x201, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:57:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 04:57:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x0) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:57:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 04:57:34 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:57:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x201, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:57:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:34 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 938.245668] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 938.265627] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:57:48 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:57:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 04:57:48 executing program 6: r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:57:48 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:57:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x0) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x302, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:57:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:57:48 executing program 2: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:57:48 executing program 0: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 951.845673] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 951.849359] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:57:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x0, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:48 executing program 2: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:57:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:57:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x302, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:57:48 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:57:48 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:57:48 executing program 6: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:57:48 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 952.215713] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 04:57:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:48 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:57:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x0, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 04:57:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x302, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:57:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:57:48 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 952.520293] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 952.543435] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:58:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:58:01 executing program 2: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:58:01 executing program 0: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x382, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:01 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x0, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:01 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:01 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 965.232014] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 965.247239] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 965.251905] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 [ 965.306568] syz-executor.6 (7463) used greatest stack depth: 23160 bytes left 04:58:01 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:58:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 04:58:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:58:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x382, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 04:58:14 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(0x0, &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:14 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:58:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:58:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 977.849663] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 977.853993] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:58:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 04:58:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 04:58:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 04:58:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x382, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:58:14 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:58:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:58:14 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(0x0, &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:29 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:58:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write(r2, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write(r2, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:29 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:58:29 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(0x0, &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 992.751111] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 992.756586] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 992.765602] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 [ 992.798780] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 04:58:29 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:58:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:29 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:58:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:29 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', 0x0, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:29 executing program 0: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(0x0, &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 993.174061] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 04:58:42 executing program 0: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:58:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:42 executing program 6: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:58:42 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', 0x0, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:42 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 1006.320692] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 04:58:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:58:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:42 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:42 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:58:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 1006.672293] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1006.672695] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1006.675510] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 [ 1006.700432] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 04:58:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:58:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:58:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:57 executing program 2: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 04:58:57 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:58:57 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', 0x0, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, 0x0, 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1020.818783] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1020.821180] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:58:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, 0x0, 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:58:57 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 1020.984189] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 04:58:57 executing program 2: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:57 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 1021.043602] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1021.047645] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:58:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:58:57 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:58:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1021.257601] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1021.260240] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:59:10 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:59:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:10 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:59:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:59:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, 0x0, 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:59:10 executing program 2: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:59:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 1034.434893] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1034.436516] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1034.452240] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:59:10 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:59:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:59:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1034.694284] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1034.704921] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:59:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:24 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:59:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fa, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:59:24 executing program 6: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:59:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:59:24 executing program 0: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:59:24 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:59:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1048.045062] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1048.054583] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:59:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fa, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:59:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:59:24 executing program 2: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:59:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:24 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 04:59:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:24 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000500)) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1048.321305] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 04:59:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 1048.354827] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:59:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:59:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fa, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:59:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:24 executing program 6: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:59:24 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 1048.589109] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1048.595446] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:59:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r4, &(0x7f00000002c0)=""/231, 0xe7) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:59:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:59:38 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000500)) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:59:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:59:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:38 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 1062.001765] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1062.039061] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1062.050201] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:59:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:52 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:59:52 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000500)) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:59:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:59:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 04:59:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:52 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 1075.705086] Restarting kernel threads ... done. [ 1075.774994] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1075.777977] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:59:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r4, &(0x7f00000002c0)=""/231, 0xe7) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:59:52 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1075.958600] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 04:59:52 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 04:59:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 04:59:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 04:59:52 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 1076.093516] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1076.101249] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 04:59:52 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 04:59:52 executing program 2: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000500)) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:00:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:00:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:00:06 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:00:06 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:00:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:00:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:00:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r4, &(0x7f00000002c0)=""/231, 0xe7) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r5, 0xffff) sendfile(r0, r1, 0x0, 0x20d315) 05:00:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1090.173165] Restarting kernel threads ... done. [ 1090.224472] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1090.263104] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 05:00:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) [ 1090.264872] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 05:00:06 executing program 2: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 1090.354177] Restarting kernel threads ... done. 05:00:06 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:00:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:00:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:00:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1090.515094] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1090.544015] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=1 05:00:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socket$packet(0x11, 0x3, 0x300) 05:00:21 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:00:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:00:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:00:21 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:00:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1105.006274] Restarting kernel threads ... done. 05:00:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socket$packet(0x11, 0x3, 0x300) 05:00:21 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 1105.104118] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1105.127536] Restarting kernel threads ... done. 05:00:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:00:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:21 executing program 6: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:00:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x401, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:00:21 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:00:21 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1105.349203] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1105.366164] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=9 05:00:21 executing program 0: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:00:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x401, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:00:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:00:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socket$packet(0x11, 0x3, 0x300) 05:00:34 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:00:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:34 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:00:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x401, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:00:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:34 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r4, &(0x7f00000002c0)=""/231, 0xe7) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r5, 0xffff) sendfile(r0, r1, 0x0, 0x20d315) [ 1118.239423] Restarting kernel threads ... done. [ 1118.260639] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1118.280056] EXT4-fs error (device loop5): __ext4_new_inode:1068: comm syz-executor.5: reserved inode found cleared - inode=9 05:00:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:00:34 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:00:34 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1118.482348] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 05:00:49 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:00:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:00:49 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:00:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:49 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 1) 05:00:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:00:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 1) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:00:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (fail_nth: 1) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) [ 1133.128627] FAULT_INJECTION: forcing a failure. [ 1133.128627] name failslab, interval 1, probability 0, space 0, times 1 [ 1133.129601] CPU: 1 PID: 8919 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1133.130144] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1133.130798] Call Trace: [ 1133.131034] dump_stack+0x107/0x167 [ 1133.131331] should_fail.cold+0x5/0xa [ 1133.131649] ? getname_flags.part.0+0x50/0x4f0 [ 1133.132013] should_failslab+0x5/0x20 [ 1133.132326] kmem_cache_alloc+0x5b/0x310 [ 1133.132653] getname_flags.part.0+0x50/0x4f0 [ 1133.133011] getname_flags+0x9a/0xe0 [ 1133.133308] do_mkdirat+0x8f/0x2b0 [ 1133.133591] ? user_path_create+0xf0/0xf0 [ 1133.133925] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.134348] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1133.134756] do_syscall_64+0x33/0x40 [ 1133.135055] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1133.135456] RIP: 0033:0x7f70572c7b19 [ 1133.135750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1133.137190] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1133.137792] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1133.138350] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1133.138902] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.139456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1133.140014] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1133.144126] FAULT_INJECTION: forcing a failure. [ 1133.144126] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.145042] CPU: 1 PID: 8921 Comm: syz-executor.2 Not tainted 5.10.215 #1 [ 1133.145577] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1133.146227] Call Trace: [ 1133.146437] dump_stack+0x107/0x167 [ 1133.146727] should_fail.cold+0x5/0xa [ 1133.147031] ? getname_flags.part.0+0x50/0x4f0 [ 1133.147395] should_failslab+0x5/0x20 [ 1133.147696] kmem_cache_alloc+0x5b/0x310 [ 1133.148021] getname_flags.part.0+0x50/0x4f0 [ 1133.148376] getname+0x8e/0xd0 [ 1133.148633] do_sys_openat2+0xf9/0x420 [ 1133.148947] ? build_open_flags+0x6f0/0x6f0 [ 1133.149286] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1133.149670] ? wait_for_completion_io+0x270/0x270 [ 1133.150055] __x64_sys_openat+0x13f/0x1f0 [ 1133.150384] ? __ia32_sys_open+0x1c0/0x1c0 [ 1133.150720] ? ksys_write+0x1a9/0x260 [ 1133.151031] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.151445] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1133.151853] do_syscall_64+0x33/0x40 [ 1133.152155] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1133.152562] RIP: 0033:0x7f2a4ebdbb19 [ 1133.152858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1133.154302] RSP: 002b:00007f2a4c151188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1133.154905] RAX: ffffffffffffffda RBX: 00007f2a4eceef60 RCX: 00007f2a4ebdbb19 [ 1133.155465] RDX: 0000000000000000 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 1133.156031] RBP: 00007f2a4c1511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.156597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1133.157160] R13: 00007ffdf2e1105f R14: 00007f2a4c151300 R15: 0000000000022000 [ 1133.193668] EXT4-fs (loop5): inodes count not valid: 65535 vs 32 05:00:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (fail_nth: 2) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:00:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 2) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 1133.220756] FAULT_INJECTION: forcing a failure. [ 1133.220756] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.226802] CPU: 0 PID: 8935 Comm: syz-executor.2 Not tainted 5.10.215 #1 [ 1133.228108] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1133.229669] Call Trace: [ 1133.230176] dump_stack+0x107/0x167 [ 1133.230864] should_fail.cold+0x5/0xa [ 1133.231590] ? create_object.isra.0+0x3a/0xa20 [ 1133.232465] should_failslab+0x5/0x20 [ 1133.233204] kmem_cache_alloc+0x5b/0x310 [ 1133.233984] create_object.isra.0+0x3a/0xa20 [ 1133.234822] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1133.235787] kmem_cache_alloc+0x159/0x310 [ 1133.236603] getname_flags.part.0+0x50/0x4f0 [ 1133.237448] getname+0x8e/0xd0 [ 1133.238075] do_sys_openat2+0xf9/0x420 [ 1133.238821] ? build_open_flags+0x6f0/0x6f0 [ 1133.239657] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1133.240597] ? wait_for_completion_io+0x270/0x270 [ 1133.241213] __x64_sys_openat+0x13f/0x1f0 [ 1133.241699] ? __ia32_sys_open+0x1c0/0x1c0 [ 1133.242183] ? ksys_write+0x1a9/0x260 [ 1133.242648] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.243258] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1133.243873] do_syscall_64+0x33/0x40 [ 1133.244320] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1133.244917] RIP: 0033:0x7f2a4ebdbb19 [ 1133.245362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1133.247448] RSP: 002b:00007f2a4c151188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1133.248317] RAX: ffffffffffffffda RBX: 00007f2a4eceef60 RCX: 00007f2a4ebdbb19 [ 1133.249136] RDX: 0000000000000000 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 1133.249970] RBP: 00007f2a4c1511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.250778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1133.251591] R13: 00007ffdf2e1105f R14: 00007f2a4c151300 R15: 0000000000022000 [ 1133.278660] FAULT_INJECTION: forcing a failure. [ 1133.278660] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.280016] CPU: 0 PID: 8940 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1133.280791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1133.281725] Call Trace: [ 1133.282042] dump_stack+0x107/0x167 [ 1133.282470] should_fail.cold+0x5/0xa [ 1133.282923] ? copy_process+0x3285/0x7800 [ 1133.283395] should_failslab+0x5/0x20 [ 1133.283831] kmem_cache_alloc_node+0x55/0x330 [ 1133.284352] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.284956] copy_process+0x3285/0x7800 [ 1133.285428] ? __lock_acquire+0xbb1/0x5b00 [ 1133.285927] ? lock_downgrade+0x6d0/0x6d0 [ 1133.286400] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1133.287003] ? __cleanup_sighand+0xb0/0xb0 [ 1133.287489] ? lock_acquire+0x197/0x470 [ 1133.287944] ? find_held_lock+0x2c/0x110 [ 1133.288423] kernel_clone+0xe7/0x980 [ 1133.288859] ? lock_downgrade+0x6d0/0x6d0 [ 1133.289326] ? find_held_lock+0x2c/0x110 [ 1133.289793] ? create_io_thread+0xf0/0xf0 [ 1133.290275] ? ksys_write+0x12d/0x260 [ 1133.290713] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1133.291272] __do_sys_fork+0x8a/0xc0 [ 1133.291713] ? kernel_thread+0xf0/0xf0 [ 1133.292183] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.292779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1133.293371] ? trace_hardirqs_on+0x5b/0x180 [ 1133.293871] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1133.294464] do_syscall_64+0x33/0x40 [ 1133.294908] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1133.295499] RIP: 0033:0x7f171180fb19 [ 1133.295939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1133.298040] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1133.298892] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1133.299726] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1133.300565] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.301390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1133.302189] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 [ 1133.304611] FAULT_INJECTION: forcing a failure. [ 1133.304611] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.305948] CPU: 0 PID: 8936 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1133.306726] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1133.307667] Call Trace: [ 1133.307982] dump_stack+0x107/0x167 [ 1133.308400] should_fail.cold+0x5/0xa [ 1133.308845] ? create_object.isra.0+0x3a/0xa20 [ 1133.309375] should_failslab+0x5/0x20 [ 1133.309820] kmem_cache_alloc+0x5b/0x310 [ 1133.310286] ? ksys_write+0x21a/0x260 [ 1133.310738] create_object.isra.0+0x3a/0xa20 [ 1133.311261] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1133.311853] kmem_cache_alloc+0x159/0x310 [ 1133.312348] getname_flags.part.0+0x50/0x4f0 [ 1133.312864] getname_flags+0x9a/0xe0 [ 1133.313286] do_mkdirat+0x8f/0x2b0 [ 1133.313692] ? user_path_create+0xf0/0xf0 [ 1133.314190] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.314801] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1133.315408] do_syscall_64+0x33/0x40 [ 1133.315838] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1133.316441] RIP: 0033:0x7f70572c7b19 [ 1133.316866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1133.319014] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1133.319864] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1133.320670] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1133.321471] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.322270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1133.323055] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1133.366402] audit: type=1326 audit(1713762049.763:161): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8923 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 05:00:49 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:00:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:00:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:00:49 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 2) 05:00:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 3) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:00:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 1133.478820] audit: type=1326 audit(1713762049.894:162): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9056 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 [ 1133.517292] FAULT_INJECTION: forcing a failure. [ 1133.517292] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1133.518665] CPU: 0 PID: 9059 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1133.519460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1133.520409] Call Trace: [ 1133.520725] dump_stack+0x107/0x167 [ 1133.521141] should_fail.cold+0x5/0xa [ 1133.521595] strncpy_from_user+0x34/0x470 [ 1133.522067] getname_flags.part.0+0x95/0x4f0 [ 1133.522568] getname_flags+0x9a/0xe0 [ 1133.523003] do_mkdirat+0x8f/0x2b0 [ 1133.523413] ? user_path_create+0xf0/0xf0 [ 1133.523890] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.524498] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1133.525093] do_syscall_64+0x33/0x40 [ 1133.525517] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1133.526099] RIP: 0033:0x7f70572c7b19 [ 1133.526522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1133.528576] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1133.529436] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1133.530236] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1133.531048] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.531850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1133.532657] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1133.540014] EXT4-fs (loop5): inodes count not valid: 65535 vs 32 05:00:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:00:49 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1133.588245] FAULT_INJECTION: forcing a failure. [ 1133.588245] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.589259] CPU: 1 PID: 9070 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1133.589795] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1133.590443] Call Trace: [ 1133.590659] dump_stack+0x107/0x167 [ 1133.590950] should_fail.cold+0x5/0xa [ 1133.591262] ? create_object.isra.0+0x3a/0xa20 [ 1133.591632] should_failslab+0x5/0x20 [ 1133.591942] kmem_cache_alloc+0x5b/0x310 [ 1133.592280] create_object.isra.0+0x3a/0xa20 [ 1133.592628] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1133.593029] kmem_cache_alloc_node+0x169/0x330 [ 1133.593397] copy_process+0x3285/0x7800 [ 1133.593713] ? __lock_acquire+0xbb1/0x5b00 [ 1133.594053] ? lock_downgrade+0x6d0/0x6d0 [ 1133.594382] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1133.594798] ? __cleanup_sighand+0xb0/0xb0 [ 1133.595137] ? lock_acquire+0x197/0x470 [ 1133.595456] ? find_held_lock+0x2c/0x110 [ 1133.595777] kernel_clone+0xe7/0x980 [ 1133.596088] ? lock_downgrade+0x6d0/0x6d0 [ 1133.596418] ? find_held_lock+0x2c/0x110 [ 1133.596739] ? create_io_thread+0xf0/0xf0 [ 1133.597070] ? ksys_write+0x12d/0x260 [ 1133.597378] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1133.597760] __do_sys_fork+0x8a/0xc0 [ 1133.598058] ? kernel_thread+0xf0/0xf0 [ 1133.598374] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.598785] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1133.599192] ? trace_hardirqs_on+0x5b/0x180 [ 1133.599536] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1133.599958] do_syscall_64+0x33/0x40 [ 1133.600263] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1133.600674] RIP: 0033:0x7f171180fb19 [ 1133.600982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1133.602420] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1133.603028] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1133.603599] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1133.604166] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.604741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1133.605302] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 05:01:04 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 3) 05:01:04 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:01:04 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:01:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:01:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:01:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:01:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:01:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1148.315542] EXT4-fs (loop5): inodes count not valid: 65535 vs 32 [ 1148.328414] FAULT_INJECTION: forcing a failure. [ 1148.328414] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.330320] CPU: 0 PID: 9086 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1148.331313] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1148.332527] Call Trace: [ 1148.332924] dump_stack+0x107/0x167 [ 1148.333462] should_fail.cold+0x5/0xa [ 1148.334027] ? __d_alloc+0x2a/0x990 [ 1148.334564] should_failslab+0x5/0x20 [ 1148.335126] kmem_cache_alloc+0x5b/0x310 [ 1148.335718] ? __d_lookup+0x3bf/0x760 [ 1148.336291] __d_alloc+0x2a/0x990 [ 1148.336793] d_alloc+0x46/0x1c0 [ 1148.337298] __lookup_hash+0xcc/0x190 [ 1148.337857] filename_create+0x186/0x4a0 [ 1148.338452] ? filename_parentat+0x570/0x570 [ 1148.339098] ? getname_flags.part.0+0x1dd/0x4f0 [ 1148.339786] do_mkdirat+0xa2/0x2b0 [ 1148.340317] ? user_path_create+0xf0/0xf0 [ 1148.340933] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1148.341702] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1148.342455] do_syscall_64+0x33/0x40 [ 1148.342987] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1148.343734] RIP: 0033:0x7f70572c7b19 [ 1148.344284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1148.346847] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1148.347959] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1148.348975] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1148.350009] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1148.351007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1148.352047] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1148.361577] audit: type=1326 audit(1713762064.777:163): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9101 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 05:01:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:01:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:01:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 1148.464685] FAULT_INJECTION: forcing a failure. [ 1148.464685] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.466415] CPU: 0 PID: 9208 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1148.467381] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1148.468539] Call Trace: [ 1148.468923] dump_stack+0x107/0x167 [ 1148.469436] should_fail.cold+0x5/0xa [ 1148.469976] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1148.470713] should_failslab+0x5/0x20 [ 1148.471253] __kmalloc_node+0x76/0x420 [ 1148.471808] ? lock_downgrade+0x6d0/0x6d0 05:01:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 5) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 1148.472407] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1148.473213] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1148.473912] ? trace_hardirqs_on+0x5b/0x180 [ 1148.474526] kmem_cache_alloc_node+0x181/0x330 [ 1148.475167] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1148.475904] copy_process+0x3285/0x7800 [ 1148.476476] ? __lock_acquire+0xbb1/0x5b00 [ 1148.477081] ? lock_downgrade+0x6d0/0x6d0 [ 1148.477659] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1148.478407] ? __cleanup_sighand+0xb0/0xb0 [ 1148.479006] ? lock_acquire+0x197/0x470 [ 1148.479572] ? find_held_lock+0x2c/0x110 [ 1148.480146] kernel_clone+0xe7/0x980 [ 1148.480677] ? lock_downgrade+0x6d0/0x6d0 [ 1148.481254] ? find_held_lock+0x2c/0x110 [ 1148.481827] ? create_io_thread+0xf0/0xf0 [ 1148.482433] ? ksys_write+0x12d/0x260 [ 1148.482983] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1148.483672] __do_sys_fork+0x8a/0xc0 [ 1148.484202] ? kernel_thread+0xf0/0xf0 [ 1148.484793] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1148.485533] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1148.486280] ? trace_hardirqs_on+0x5b/0x180 [ 1148.486886] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1148.487627] do_syscall_64+0x33/0x40 [ 1148.488151] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1148.488897] RIP: 0033:0x7f171180fb19 [ 1148.489521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1148.492325] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1148.493434] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1148.494463] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1148.495498] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1148.496535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1148.497567] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 [ 1148.540402] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1148.541910] EXT4-fs (loop5): group descriptors corrupted! [ 1148.652279] FAULT_INJECTION: forcing a failure. [ 1148.652279] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.653223] CPU: 1 PID: 9218 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1148.653767] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1148.654423] Call Trace: [ 1148.654645] dump_stack+0x107/0x167 [ 1148.654941] should_fail.cold+0x5/0xa [ 1148.655249] ? create_object.isra.0+0x3a/0xa20 [ 1148.655622] should_failslab+0x5/0x20 [ 1148.655932] kmem_cache_alloc+0x5b/0x310 [ 1148.656269] create_object.isra.0+0x3a/0xa20 [ 1148.656624] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1148.657039] kmem_cache_alloc+0x159/0x310 [ 1148.657377] __d_alloc+0x2a/0x990 [ 1148.657658] ? dput+0x1ae/0xcd0 [ 1148.657927] d_alloc+0x46/0x1c0 [ 1148.658199] __lookup_hash+0xcc/0x190 [ 1148.658505] filename_create+0x186/0x4a0 [ 1148.658834] ? filename_parentat+0x570/0x570 [ 1148.659192] ? getname_flags.part.0+0x1dd/0x4f0 [ 1148.659575] do_mkdirat+0xa2/0x2b0 [ 1148.659868] ? user_path_create+0xf0/0xf0 [ 1148.660210] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1148.660642] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1148.661053] do_syscall_64+0x33/0x40 [ 1148.661354] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1148.661763] RIP: 0033:0x7f70572c7b19 [ 1148.662062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1148.663533] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1148.664142] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1148.664712] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1148.665274] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1148.665841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1148.666410] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:01:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:01:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:01:05 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:01:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1148.772907] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1148.774338] EXT4-fs (loop5): group descriptors corrupted! 05:01:19 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 4) 05:01:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:01:19 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:01:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 6) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:01:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:01:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:01:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x8, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:01:19 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1163.333016] FAULT_INJECTION: forcing a failure. [ 1163.333016] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.334971] CPU: 0 PID: 9341 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1163.335960] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.337162] Call Trace: [ 1163.337555] dump_stack+0x107/0x167 [ 1163.338089] should_fail.cold+0x5/0xa [ 1163.338645] ? alloc_inode+0x171/0x240 [ 1163.339215] should_failslab+0x5/0x20 [ 1163.339767] kmem_cache_alloc+0x5b/0x310 [ 1163.340356] ? d_alloc+0x163/0x1c0 [ 1163.340882] alloc_inode+0x171/0x240 [ 1163.341429] iget_locked+0x1ae/0x6a0 [ 1163.341973] kernfs_get_inode+0x47/0x520 [ 1163.342564] kernfs_iop_lookup+0x194/0x220 [ 1163.343187] __lookup_hash+0x121/0x190 [ 1163.343753] filename_create+0x186/0x4a0 [ 1163.344346] ? filename_parentat+0x570/0x570 [ 1163.344992] ? getname_flags.part.0+0x1dd/0x4f0 [ 1163.345677] do_mkdirat+0xa2/0x2b0 [ 1163.346198] ? user_path_create+0xf0/0xf0 [ 1163.346810] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.347583] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.348340] do_syscall_64+0x33/0x40 [ 1163.348886] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1163.349625] RIP: 0033:0x7f70572c7b19 [ 1163.350166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.352811] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1163.353912] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1163.354941] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1163.355967] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1163.356994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1163.358014] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1163.366924] audit: type=1326 audit(1713762079.782:164): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9343 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 05:01:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:01:19 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) [ 1163.417303] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1163.418735] EXT4-fs (loop5): group descriptors corrupted! [ 1163.427256] FAULT_INJECTION: forcing a failure. [ 1163.427256] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.428619] CPU: 1 PID: 9376 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1163.429426] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.430335] Call Trace: [ 1163.430631] dump_stack+0x107/0x167 [ 1163.431044] should_fail.cold+0x5/0xa [ 1163.431457] ? prepare_creds+0x25/0x5e0 [ 1163.431910] should_failslab+0x5/0x20 [ 1163.432335] kmem_cache_alloc+0x5b/0x310 [ 1163.432788] ? lock_downgrade+0x6d0/0x6d0 [ 1163.433290] prepare_creds+0x25/0x5e0 [ 1163.433697] copy_creds+0x72/0x580 [ 1163.434094] copy_process+0xfdc/0x7800 [ 1163.434527] ? __lock_acquire+0xbb1/0x5b00 [ 1163.434996] ? lock_downgrade+0x6d0/0x6d0 [ 1163.435449] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1163.436053] ? __cleanup_sighand+0xb0/0xb0 [ 1163.436517] ? lock_acquire+0x197/0x470 [ 1163.436952] ? find_held_lock+0x2c/0x110 [ 1163.437392] kernel_clone+0xe7/0x980 [ 1163.437802] ? lock_downgrade+0x6d0/0x6d0 [ 1163.438274] ? find_held_lock+0x2c/0x110 [ 1163.438705] ? create_io_thread+0xf0/0xf0 [ 1163.439156] ? ksys_write+0x12d/0x260 [ 1163.439569] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1163.440094] __do_sys_fork+0x8a/0xc0 [ 1163.440500] ? kernel_thread+0xf0/0xf0 [ 1163.440931] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.441490] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.442066] ? trace_hardirqs_on+0x5b/0x180 [ 1163.442536] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.443094] do_syscall_64+0x33/0x40 [ 1163.443545] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1163.444209] RIP: 0033:0x7f171180fb19 [ 1163.444715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.446965] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1163.447942] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1163.448765] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1163.449553] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1163.450343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1163.451152] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 05:01:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 7) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 1163.553068] FAULT_INJECTION: forcing a failure. [ 1163.553068] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.554499] CPU: 1 PID: 9449 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1163.555210] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.556077] Call Trace: [ 1163.556359] dump_stack+0x107/0x167 [ 1163.556760] should_fail.cold+0x5/0xa [ 1163.557164] ? create_object.isra.0+0x3a/0xa20 [ 1163.557653] should_failslab+0x5/0x20 [ 1163.558057] kmem_cache_alloc+0x5b/0x310 [ 1163.558487] create_object.isra.0+0x3a/0xa20 [ 1163.558950] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1163.559482] __kmalloc+0x16e/0x390 [ 1163.559871] cgroup_mkdir+0x254/0xf50 [ 1163.560284] ? cgroup_destroy_locked+0x710/0x710 [ 1163.560786] kernfs_iop_mkdir+0x14d/0x1e0 [ 1163.561219] vfs_mkdir+0x493/0x700 [ 1163.561592] do_mkdirat+0x150/0x2b0 [ 1163.561979] ? user_path_create+0xf0/0xf0 [ 1163.562413] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.562958] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.563499] do_syscall_64+0x33/0x40 [ 1163.563890] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1163.564422] RIP: 0033:0x7f70572c7b19 [ 1163.564815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.566698] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1163.567491] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1163.568234] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1163.568973] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1163.569708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1163.570445] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:01:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, 0x0, 0x200) 05:01:34 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 5) 05:01:34 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:01:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:01:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 8) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:01:34 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:01:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:01:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x18, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) [ 1177.809333] FAULT_INJECTION: forcing a failure. [ 1177.809333] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.810313] CPU: 1 PID: 9487 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1177.810846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.811498] Call Trace: [ 1177.811716] dump_stack+0x107/0x167 [ 1177.812008] should_fail.cold+0x5/0xa [ 1177.812321] ? create_object.isra.0+0x3a/0xa20 [ 1177.812691] should_failslab+0x5/0x20 [ 1177.813000] kmem_cache_alloc+0x5b/0x310 [ 1177.813334] create_object.isra.0+0x3a/0xa20 [ 1177.813698] kmemleak_alloc_percpu+0xa0/0x100 [ 1177.814060] pcpu_alloc+0x4e2/0x1240 [ 1177.814378] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 1177.814758] percpu_ref_init+0x31/0x3d0 [ 1177.815082] cgroup_mkdir+0x28b/0xf50 [ 1177.815103] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1177.815119] EXT4-fs (loop5): group descriptors corrupted! [ 1177.815421] ? cgroup_destroy_locked+0x710/0x710 [ 1177.817776] kernfs_iop_mkdir+0x14d/0x1e0 [ 1177.818112] vfs_mkdir+0x493/0x700 [ 1177.818395] do_mkdirat+0x150/0x2b0 [ 1177.818687] ? user_path_create+0xf0/0xf0 [ 1177.819026] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1177.819437] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1177.819850] do_syscall_64+0x33/0x40 [ 1177.820150] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1177.820552] RIP: 0033:0x7f70572c7b19 [ 1177.820855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.822268] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1177.822861] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1177.823412] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1177.823987] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.824536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1177.825106] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1177.827437] audit: type=1326 audit(1713762094.243:165): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9489 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 [ 1177.915083] FAULT_INJECTION: forcing a failure. [ 1177.915083] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.917049] CPU: 0 PID: 9592 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1177.918275] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.919755] Call Trace: [ 1177.920238] dump_stack+0x107/0x167 [ 1177.920909] should_fail.cold+0x5/0xa [ 1177.921620] ? create_object.isra.0+0x3a/0xa20 [ 1177.922453] should_failslab+0x5/0x20 [ 1177.923146] kmem_cache_alloc+0x5b/0x310 [ 1177.923887] ? create_object.isra.0+0x3ad/0xa20 [ 1177.924742] create_object.isra.0+0x3a/0xa20 [ 1177.925542] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1177.926468] __kmalloc_node+0x1ae/0x420 [ 1177.927199] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1177.928108] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1177.929033] ? trace_hardirqs_on+0x5b/0x180 [ 1177.929818] kmem_cache_alloc_node+0x181/0x330 [ 1177.930660] copy_process+0x3285/0x7800 [ 1177.931395] ? __lock_acquire+0xbb1/0x5b00 [ 1177.932180] ? lock_downgrade+0x6d0/0x6d0 [ 1177.932949] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1177.933737] ? __cleanup_sighand+0xb0/0xb0 [ 1177.934520] ? lock_acquire+0x197/0x470 [ 1177.935258] ? find_held_lock+0x2c/0x110 [ 1177.936005] kernel_clone+0xe7/0x980 [ 1177.936694] ? lock_downgrade+0x6d0/0x6d0 [ 1177.937367] ? find_held_lock+0x2c/0x110 [ 1177.938083] ? create_io_thread+0xf0/0xf0 [ 1177.938705] ? ksys_write+0x12d/0x260 [ 1177.939407] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1177.940128] __do_sys_fork+0x8a/0xc0 [ 1177.940814] ? kernel_thread+0xf0/0xf0 [ 1177.941409] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1177.942355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1177.943110] ? trace_hardirqs_on+0x5b/0x180 [ 1177.943894] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1177.944658] do_syscall_64+0x33/0x40 [ 1177.945346] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1177.946100] RIP: 0033:0x7f171180fb19 [ 1177.946774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.949436] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1177.950803] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1177.951906] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1177.952958] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.954007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1177.955059] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 05:01:34 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:01:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:01:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 9) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:01:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x1800, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:01:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, 0x0, 0x200) [ 1178.034910] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1178.036342] EXT4-fs (loop5): group descriptors corrupted! 05:01:34 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:01:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 1178.132104] FAULT_INJECTION: forcing a failure. [ 1178.132104] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.133101] CPU: 1 PID: 9620 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1178.133647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.134314] Call Trace: [ 1178.134534] dump_stack+0x107/0x167 [ 1178.134829] should_fail.cold+0x5/0xa [ 1178.135137] ? create_object.isra.0+0x3a/0xa20 [ 1178.135503] should_failslab+0x5/0x20 [ 1178.135814] kmem_cache_alloc+0x5b/0x310 [ 1178.136142] create_object.isra.0+0x3a/0xa20 [ 1178.136499] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1178.136915] kmem_cache_alloc+0x159/0x310 [ 1178.137275] security_inode_alloc+0x34/0x160 [ 1178.137635] inode_init_always+0xa4e/0xd10 [ 1178.137974] alloc_inode+0x84/0x240 [ 1178.138267] iget_locked+0x1ae/0x6a0 [ 1178.138571] kernfs_get_inode+0x47/0x520 [ 1178.138898] kernfs_iop_lookup+0x194/0x220 [ 1178.139243] __lookup_hash+0x121/0x190 [ 1178.139554] filename_create+0x186/0x4a0 [ 1178.139879] ? filename_parentat+0x570/0x570 [ 1178.140227] ? getname_flags.part.0+0x1dd/0x4f0 [ 1178.140611] do_mkdirat+0xa2/0x2b0 [ 1178.140903] ? user_path_create+0xf0/0xf0 [ 1178.141240] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.141656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.142072] do_syscall_64+0x33/0x40 [ 1178.142377] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1178.142786] RIP: 0033:0x7f70572c7b19 [ 1178.143091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.144571] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1178.145193] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1178.145764] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1178.146342] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1178.146910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1178.147479] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:01:34 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:01:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 1178.264530] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1178.265347] EXT4-fs (loop5): group descriptors corrupted! 05:01:49 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:01:49 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), 0x0, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:01:49 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 6) 05:01:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, 0x0, 0x200) 05:01:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x80000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:01:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:01:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:01:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 1193.074645] audit: type=1326 audit(1713762109.490:166): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9735 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 [ 1193.096813] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1193.098308] EXT4-fs (loop5): group descriptors corrupted! [ 1193.141548] FAULT_INJECTION: forcing a failure. [ 1193.141548] name failslab, interval 1, probability 0, space 0, times 0 [ 1193.143364] CPU: 0 PID: 9749 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1193.144418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1193.145702] Call Trace: [ 1193.146121] dump_stack+0x107/0x167 [ 1193.146685] should_fail.cold+0x5/0xa [ 1193.147278] ? percpu_ref_init+0xd8/0x3d0 [ 1193.147919] should_failslab+0x5/0x20 [ 1193.148507] kmem_cache_alloc_trace+0x55/0x320 [ 1193.149221] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 1193.149946] percpu_ref_init+0xd8/0x3d0 [ 1193.150562] cgroup_mkdir+0x28b/0xf50 [ 1193.151155] ? cgroup_destroy_locked+0x710/0x710 [ 1193.151887] kernfs_iop_mkdir+0x14d/0x1e0 [ 1193.152526] vfs_mkdir+0x493/0x700 [ 1193.153082] do_mkdirat+0x150/0x2b0 [ 1193.153644] ? user_path_create+0xf0/0xf0 [ 1193.154286] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1193.155091] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1193.155882] do_syscall_64+0x33/0x40 [ 1193.156455] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1193.157242] RIP: 0033:0x7f70572c7b19 [ 1193.157811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1193.160614] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1193.161784] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1193.162872] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1193.163959] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1193.165048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1193.166130] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:01:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 1193.178740] FAULT_INJECTION: forcing a failure. [ 1193.178740] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1193.180592] CPU: 0 PID: 9854 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1193.181643] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1193.182901] Call Trace: [ 1193.183308] dump_stack+0x107/0x167 [ 1193.183870] should_fail.cold+0x5/0xa [ 1193.184458] __alloc_pages_nodemask+0x182/0x600 [ 1193.185174] ? lock_downgrade+0x6d0/0x6d0 [ 1193.185810] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1193.186726] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1193.187524] ? kmem_cache_alloc_node+0x2bc/0x330 [ 1193.188252] copy_process+0x618/0x7800 [ 1193.188857] ? __lock_acquire+0xbb1/0x5b00 [ 1193.189512] ? lock_downgrade+0x6d0/0x6d0 [ 1193.190150] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1193.190957] ? __cleanup_sighand+0xb0/0xb0 [ 1193.191608] ? lock_acquire+0x197/0x470 [ 1193.192224] ? find_held_lock+0x2c/0x110 [ 1193.192857] kernel_clone+0xe7/0x980 [ 1193.193429] ? lock_downgrade+0x6d0/0x6d0 [ 1193.194061] ? find_held_lock+0x2c/0x110 [ 1193.194681] ? create_io_thread+0xf0/0xf0 [ 1193.195318] ? ksys_write+0x12d/0x260 [ 1193.195911] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1193.196652] __do_sys_fork+0x8a/0xc0 [ 1193.197233] ? kernel_thread+0xf0/0xf0 [ 1193.197843] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1193.198642] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1193.199427] ? trace_hardirqs_on+0x5b/0x180 [ 1193.200092] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1193.200884] do_syscall_64+0x33/0x40 [ 1193.201452] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1193.202232] RIP: 0033:0x7f171180fb19 [ 1193.202800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1193.205563] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1193.206653] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1193.207675] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1193.208701] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1193.209737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1193.210759] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 [ 1193.281570] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1193.282997] EXT4-fs (loop5): group descriptors corrupted! 05:01:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:01:49 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) 05:01:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x1000000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:01:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 11) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:01:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) 05:01:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 1193.514170] FAULT_INJECTION: forcing a failure. [ 1193.514170] name failslab, interval 1, probability 0, space 0, times 0 [ 1193.515891] CPU: 0 PID: 9870 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1193.516906] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1193.518111] Call Trace: [ 1193.518502] dump_stack+0x107/0x167 [ 1193.519042] should_fail.cold+0x5/0xa [ 1193.519606] ? create_object.isra.0+0x3a/0xa20 [ 1193.520282] should_failslab+0x5/0x20 [ 1193.520850] kmem_cache_alloc+0x5b/0x310 [ 1193.521452] create_object.isra.0+0x3a/0xa20 [ 1193.522093] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1193.522843] kmem_cache_alloc_trace+0x151/0x320 [ 1193.523527] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 1193.524219] percpu_ref_init+0xd8/0x3d0 [ 1193.524813] cgroup_mkdir+0x28b/0xf50 [ 1193.525383] ? cgroup_destroy_locked+0x710/0x710 [ 1193.526075] kernfs_iop_mkdir+0x14d/0x1e0 [ 1193.526686] vfs_mkdir+0x493/0x700 [ 1193.527207] do_mkdirat+0x150/0x2b0 [ 1193.527745] ? user_path_create+0xf0/0xf0 [ 1193.528364] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1193.529146] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1193.529907] do_syscall_64+0x33/0x40 [ 1193.530450] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1193.531199] RIP: 0033:0x7f70572c7b19 [ 1193.531743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1193.534398] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1193.535497] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1193.536540] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1193.537585] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1193.538623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1193.539659] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1193.589353] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1193.590824] EXT4-fs (loop5): group descriptors corrupted! 05:01:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) 05:01:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:01:50 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), 0x0, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:02:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 12) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:02:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:02:05 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), 0x0, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:02:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:02:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x2000000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:02:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) 05:02:05 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 7) 05:02:05 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x2f, 0x0) [ 1209.171648] audit: type=1326 audit(1713762125.587:167): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10005 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 [ 1209.184088] FAULT_INJECTION: forcing a failure. [ 1209.184088] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.186080] CPU: 0 PID: 10008 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1209.187119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1209.187152] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1209.188357] Call Trace: [ 1209.188388] dump_stack+0x107/0x167 [ 1209.188417] should_fail.cold+0x5/0xa [ 1209.189767] EXT4-fs (loop5): group descriptors corrupted! [ 1209.190149] ? create_object.isra.0+0x3a/0xa20 [ 1209.192683] should_failslab+0x5/0x20 [ 1209.193264] kmem_cache_alloc+0x5b/0x310 [ 1209.193877] create_object.isra.0+0x3a/0xa20 [ 1209.194547] kmemleak_alloc_percpu+0xa0/0x100 [ 1209.195219] pcpu_alloc+0x4e2/0x1240 [ 1209.195795] cgroup_rstat_init+0x14f/0x1f0 [ 1209.196430] cgroup_mkdir+0x709/0xf50 [ 1209.197009] ? cgroup_destroy_locked+0x710/0x710 [ 1209.197716] kernfs_iop_mkdir+0x14d/0x1e0 [ 1209.198321] vfs_mkdir+0x493/0x700 [ 1209.198851] do_mkdirat+0x150/0x2b0 [ 1209.199388] ? user_path_create+0xf0/0xf0 [ 1209.199992] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1209.200745] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1209.201487] do_syscall_64+0x33/0x40 [ 1209.202025] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1209.202749] RIP: 0033:0x7f70572c7b19 [ 1209.203293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.205914] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1209.207015] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1209.208034] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1209.209059] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1209.210080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1209.211106] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:02:05 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x2f, 0x0) [ 1209.274512] FAULT_INJECTION: forcing a failure. [ 1209.274512] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.276183] CPU: 0 PID: 10085 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1209.277202] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1209.278420] Call Trace: [ 1209.278809] dump_stack+0x107/0x167 [ 1209.279340] should_fail.cold+0x5/0xa [ 1209.279903] ? create_object.isra.0+0x3a/0xa20 [ 1209.280582] should_failslab+0x5/0x20 [ 1209.281153] kmem_cache_alloc+0x5b/0x310 [ 1209.281758] create_object.isra.0+0x3a/0xa20 [ 1209.282413] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1209.283146] __kmalloc+0x16e/0x390 [ 1209.283671] security_prepare_creds+0x112/0x190 [ 1209.284356] prepare_creds+0x452/0x5e0 [ 1209.284928] copy_creds+0x72/0x580 [ 1209.285466] copy_process+0xfdc/0x7800 [ 1209.286040] ? __lock_acquire+0xbb1/0x5b00 [ 1209.286660] ? lock_downgrade+0x6d0/0x6d0 [ 1209.287266] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1209.288021] ? __cleanup_sighand+0xb0/0xb0 [ 1209.288639] ? lock_acquire+0x197/0x470 [ 1209.289246] ? find_held_lock+0x2c/0x110 [ 1209.289847] kernel_clone+0xe7/0x980 [ 1209.290396] ? lock_downgrade+0x6d0/0x6d0 [ 1209.291003] ? find_held_lock+0x2c/0x110 [ 1209.291587] ? create_io_thread+0xf0/0xf0 [ 1209.292195] ? ksys_write+0x12d/0x260 [ 1209.292754] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1209.293471] __do_sys_fork+0x8a/0xc0 [ 1209.294017] ? kernel_thread+0xf0/0xf0 [ 1209.294599] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1209.295364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1209.296106] ? trace_hardirqs_on+0x5b/0x180 [ 1209.296727] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1209.297485] do_syscall_64+0x33/0x40 [ 1209.298024] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1209.298765] RIP: 0033:0x7f171180fb19 [ 1209.299309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.301961] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1209.303083] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1209.304116] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1209.305144] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1209.306170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1209.307196] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 05:02:05 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:02:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:02:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:02:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:02:05 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x2f, 0x0) 05:02:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 13) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:02:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 1209.591332] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1209.592959] EXT4-fs (loop5): group descriptors corrupted! [ 1209.649653] FAULT_INJECTION: forcing a failure. [ 1209.649653] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.651361] CPU: 1 PID: 10171 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1209.652383] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1209.653597] Call Trace: [ 1209.654002] dump_stack+0x107/0x167 [ 1209.654541] should_fail.cold+0x5/0xa [ 1209.655111] ? create_object.isra.0+0x3a/0xa20 [ 1209.655796] should_failslab+0x5/0x20 [ 1209.656368] kmem_cache_alloc+0x5b/0x310 [ 1209.656991] ? mark_held_locks+0x9e/0xe0 [ 1209.657597] create_object.isra.0+0x3a/0xa20 [ 1209.658259] kmemleak_alloc_percpu+0xa0/0x100 [ 1209.658937] pcpu_alloc+0x4e2/0x1240 [ 1209.659509] cgroup_rstat_init+0x14f/0x1f0 [ 1209.660132] cgroup_mkdir+0x709/0xf50 [ 1209.660708] ? cgroup_destroy_locked+0x710/0x710 [ 1209.661426] kernfs_iop_mkdir+0x14d/0x1e0 [ 1209.662040] vfs_mkdir+0x493/0x700 [ 1209.662576] do_mkdirat+0x150/0x2b0 [ 1209.663110] ? user_path_create+0xf0/0xf0 [ 1209.663732] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1209.664511] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1209.665266] do_syscall_64+0x33/0x40 [ 1209.665821] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1209.666559] RIP: 0033:0x7f70572c7b19 [ 1209.667116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.669773] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1209.670895] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1209.671942] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1209.673008] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1209.674052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1209.675094] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:02:06 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, 0x0, 0x0, 0x0) 05:02:21 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 8) 05:02:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:02:21 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, 0x0, 0x0, 0x0) 05:02:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:02:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:02:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x18000000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:02:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 14) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:02:21 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1224.700580] audit: type=1326 audit(1713762141.116:168): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10271 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 05:02:21 executing program 7: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, 0x0, 0x0, 0x0) [ 1224.709674] FAULT_INJECTION: forcing a failure. [ 1224.709674] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.711574] CPU: 0 PID: 10266 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1224.712599] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1224.713822] Call Trace: [ 1224.714226] dump_stack+0x107/0x167 [ 1224.714767] should_fail.cold+0x5/0xa [ 1224.715347] should_failslab+0x5/0x20 [ 1224.715916] __kmalloc_track_caller+0x79/0x370 [ 1224.716597] ? kstrdup_const+0x53/0x80 [ 1224.717179] ? find_held_lock+0x2c/0x110 [ 1224.717784] kstrdup+0x36/0x70 [ 1224.718269] kstrdup_const+0x53/0x80 [ 1224.718833] __kernfs_new_node+0x9d/0x860 [ 1224.719453] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1224.720145] ? asm_sysvec_call_function_single+0x12/0x20 [ 1224.720929] ? trace_hardirqs_on+0x5b/0x180 [ 1224.721576] ? _find_next_bit.constprop.0+0x2f/0x200 [ 1224.722317] ? _find_next_bit.constprop.0+0x3d/0x200 [ 1224.723061] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 1224.723752] kernfs_new_node+0x18d/0x250 [ 1224.724353] kernfs_create_dir_ns+0x49/0x160 [ 1224.725009] cgroup_mkdir+0x318/0xf50 [ 1224.725587] ? cgroup_destroy_locked+0x710/0x710 [ 1224.726287] kernfs_iop_mkdir+0x14d/0x1e0 [ 1224.726891] vfs_mkdir+0x493/0x700 [ 1224.727418] do_mkdirat+0x150/0x2b0 [ 1224.727954] ? user_path_create+0xf0/0xf0 [ 1224.728562] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1224.729337] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1224.730090] do_syscall_64+0x33/0x40 [ 1224.730639] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1224.731383] RIP: 0033:0x7f70572c7b19 [ 1224.731942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1224.734612] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1224.735712] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1224.736732] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1224.737770] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1224.738800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1224.739828] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1224.751878] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1224.753315] EXT4-fs (loop5): group descriptors corrupted! [ 1224.802196] FAULT_INJECTION: forcing a failure. [ 1224.802196] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.803436] CPU: 1 PID: 10345 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1224.804166] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1224.805031] Call Trace: [ 1224.805332] dump_stack+0x107/0x167 [ 1224.805717] should_fail.cold+0x5/0xa [ 1224.806125] ? __delayacct_tsk_init+0x1b/0x80 [ 1224.806604] should_failslab+0x5/0x20 [ 1224.807012] kmem_cache_alloc+0x5b/0x310 [ 1224.807442] ? prepare_creds+0x466/0x5e0 [ 1224.807874] __delayacct_tsk_init+0x1b/0x80 [ 1224.808330] copy_process+0x3319/0x7800 [ 1224.808760] ? __lock_acquire+0xbb1/0x5b00 [ 1224.809201] ? lock_downgrade+0x6d0/0x6d0 [ 1224.809646] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1224.810202] ? __cleanup_sighand+0xb0/0xb0 [ 1224.810652] ? lock_acquire+0x197/0x470 [ 1224.811058] ? find_held_lock+0x2c/0x110 [ 1224.811488] kernel_clone+0xe7/0x980 [ 1224.811879] ? lock_downgrade+0x6d0/0x6d0 [ 1224.812311] ? find_held_lock+0x2c/0x110 [ 1224.812711] ? create_io_thread+0xf0/0xf0 [ 1224.813162] ? ksys_write+0x12d/0x260 [ 1224.813547] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1224.814055] __do_sys_fork+0x8a/0xc0 [ 1224.814429] ? kernel_thread+0xf0/0xf0 [ 1224.814852] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1224.815369] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1224.815904] ? trace_hardirqs_on+0x5b/0x180 [ 1224.816335] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1224.816870] do_syscall_64+0x33/0x40 [ 1224.817245] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1224.817780] RIP: 0033:0x7f171180fb19 [ 1224.818153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1224.820055] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1224.820796] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1224.821489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1224.822174] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1224.822859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1224.823552] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 05:02:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 15) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:02:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:02:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0xf6ffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) [ 1224.934735] FAULT_INJECTION: forcing a failure. [ 1224.934735] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.935931] CPU: 1 PID: 10391 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1224.936614] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1224.937446] Call Trace: [ 1224.937719] dump_stack+0x107/0x167 [ 1224.938071] should_fail.cold+0x5/0xa [ 1224.938457] ? create_object.isra.0+0x3a/0xa20 [ 1224.938890] should_failslab+0x5/0x20 [ 1224.939277] kmem_cache_alloc+0x5b/0x310 [ 1224.939665] create_object.isra.0+0x3a/0xa20 [ 1224.940114] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1224.940594] __kmalloc_track_caller+0x177/0x370 [ 1224.941062] ? kstrdup_const+0x53/0x80 [ 1224.941439] ? find_held_lock+0x2c/0x110 [ 1224.941855] kstrdup+0x36/0x70 [ 1224.942176] kstrdup_const+0x53/0x80 [ 1224.942548] __kernfs_new_node+0x9d/0x860 [ 1224.942940] ? mark_held_locks+0x9e/0xe0 [ 1224.943348] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1224.943798] ? cpumask_next+0x1f/0x30 [ 1224.944179] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1224.944613] ? pcpu_alloc+0x12a/0x1240 [ 1224.945013] kernfs_new_node+0x18d/0x250 [ 1224.945408] kernfs_create_dir_ns+0x49/0x160 [ 1224.945854] cgroup_mkdir+0x318/0xf50 [ 1224.946236] ? cgroup_destroy_locked+0x710/0x710 [ 1224.946681] kernfs_iop_mkdir+0x14d/0x1e0 [ 1224.947096] vfs_mkdir+0x493/0x700 [ 1224.947452] do_mkdirat+0x150/0x2b0 [ 1224.947798] ? user_path_create+0xf0/0xf0 [ 1224.948216] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1224.948703] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1224.949224] do_syscall_64+0x33/0x40 [ 1224.949573] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1224.950085] RIP: 0033:0x7f70572c7b19 [ 1224.950456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1224.952258] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1224.953008] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1224.953718] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1224.954416] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1224.955117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1224.955819] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:02:21 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:02:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:02:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:02:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x18, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) [ 1225.100434] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:02:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:02:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 16) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:02:38 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 9) 05:02:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 1242.440175] audit: type=1326 audit(1713762158.856:169): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10521 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 05:02:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0xfffffff6, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:02:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:02:38 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:02:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1242.473319] FAULT_INJECTION: forcing a failure. [ 1242.473319] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.474814] CPU: 1 PID: 10524 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1242.475613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1242.476554] Call Trace: [ 1242.476859] dump_stack+0x107/0x167 [ 1242.477282] should_fail.cold+0x5/0xa [ 1242.477729] ? __kernfs_new_node+0xd4/0x860 [ 1242.478219] should_failslab+0x5/0x20 [ 1242.478650] kmem_cache_alloc+0x5b/0x310 [ 1242.479115] __kernfs_new_node+0xd4/0x860 [ 1242.479588] ? mark_held_locks+0x9e/0xe0 [ 1242.480063] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1242.480598] ? cpumask_next+0x1f/0x30 [ 1242.481036] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1242.481574] ? pcpu_alloc+0x12a/0x1240 [ 1242.482031] kernfs_new_node+0x18d/0x250 [ 1242.482499] kernfs_create_dir_ns+0x49/0x160 [ 1242.483002] cgroup_mkdir+0x318/0xf50 [ 1242.483446] ? cgroup_destroy_locked+0x710/0x710 [ 1242.483986] kernfs_iop_mkdir+0x14d/0x1e0 [ 1242.484460] vfs_mkdir+0x493/0x700 [ 1242.484871] do_mkdirat+0x150/0x2b0 [ 1242.485300] ? user_path_create+0xf0/0xf0 [ 1242.485781] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1242.486368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1242.486952] do_syscall_64+0x33/0x40 [ 1242.487372] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1242.487954] RIP: 0033:0x7f70572c7b19 [ 1242.488374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1242.490451] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1242.491318] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1242.492117] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1242.492918] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1242.493726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1242.494533] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1242.541048] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1242.548944] FAULT_INJECTION: forcing a failure. [ 1242.548944] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.550863] CPU: 0 PID: 10572 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1242.552027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1242.553423] Call Trace: [ 1242.553875] dump_stack+0x107/0x167 [ 1242.554496] should_fail.cold+0x5/0xa [ 1242.555146] ? create_object.isra.0+0x3a/0xa20 [ 1242.555921] should_failslab+0x5/0x20 [ 1242.556571] kmem_cache_alloc+0x5b/0x310 [ 1242.557266] create_object.isra.0+0x3a/0xa20 [ 1242.558020] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1242.558883] kmem_cache_alloc+0x159/0x310 [ 1242.559583] ? prepare_creds+0x466/0x5e0 [ 1242.560278] __delayacct_tsk_init+0x1b/0x80 [ 1242.561009] copy_process+0x3319/0x7800 [ 1242.561696] ? __lock_acquire+0xbb1/0x5b00 [ 1242.562424] ? lock_downgrade+0x6d0/0x6d0 [ 1242.563127] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1242.564011] ? __cleanup_sighand+0xb0/0xb0 [ 1242.564728] ? lock_acquire+0x197/0x470 [ 1242.565408] ? find_held_lock+0x2c/0x110 [ 1242.566093] kernel_clone+0xe7/0x980 [ 1242.566719] ? lock_downgrade+0x6d0/0x6d0 [ 1242.567411] ? find_held_lock+0x2c/0x110 [ 1242.568092] ? create_io_thread+0xf0/0xf0 [ 1242.568791] ? ksys_write+0x12d/0x260 [ 1242.569447] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1242.570262] __do_sys_fork+0x8a/0xc0 [ 1242.570884] ? kernel_thread+0xf0/0xf0 [ 1242.571551] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1242.572423] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1242.573278] ? trace_hardirqs_on+0x5b/0x180 [ 1242.574008] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1242.574865] do_syscall_64+0x33/0x40 [ 1242.575487] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1242.576340] RIP: 0033:0x7f171180fb19 [ 1242.576958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1242.579990] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1242.581257] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1242.582446] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1242.583627] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1242.584804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1242.585989] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 05:02:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 17) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:02:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:02:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:02:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:02:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x1000000000000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) [ 1242.728266] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:02:39 executing program 1: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1242.777353] FAULT_INJECTION: forcing a failure. [ 1242.777353] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.778552] CPU: 1 PID: 10656 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1242.779252] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1242.780086] Call Trace: [ 1242.780364] dump_stack+0x107/0x167 [ 1242.780745] should_fail.cold+0x5/0xa [ 1242.781138] ? create_object.isra.0+0x3a/0xa20 [ 1242.781615] should_failslab+0x5/0x20 [ 1242.782007] kmem_cache_alloc+0x5b/0x310 [ 1242.782429] create_object.isra.0+0x3a/0xa20 [ 1242.782886] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1242.783408] kmem_cache_alloc+0x159/0x310 [ 1242.783837] __kernfs_new_node+0xd4/0x860 [ 1242.784272] ? mark_held_locks+0x9e/0xe0 [ 1242.784690] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1242.785178] ? cpumask_next+0x1f/0x30 [ 1242.785582] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1242.786057] ? pcpu_alloc+0x12a/0x1240 [ 1242.786466] kernfs_new_node+0x18d/0x250 [ 1242.786893] kernfs_create_dir_ns+0x49/0x160 [ 1242.787348] cgroup_mkdir+0x318/0xf50 [ 1242.787746] ? cgroup_destroy_locked+0x710/0x710 [ 1242.788233] kernfs_iop_mkdir+0x14d/0x1e0 [ 1242.788660] vfs_mkdir+0x493/0x700 [ 1242.789031] do_mkdirat+0x150/0x2b0 [ 1242.789416] ? user_path_create+0xf0/0xf0 [ 1242.789846] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1242.790386] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1242.790916] do_syscall_64+0x33/0x40 [ 1242.791298] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1242.791820] RIP: 0033:0x7f70572c7b19 [ 1242.792202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1242.794073] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1242.794851] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1242.795579] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1242.796308] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1242.797023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1242.797750] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:02:39 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:02:53 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 10) 05:02:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:02:53 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:02:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x8000000000000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:02:53 executing program 7: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:02:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:02:53 executing program 1: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) (fail_nth: 1) 05:02:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 18) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 1257.254910] audit: type=1326 audit(1713762173.670:170): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10794 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 [ 1257.258178] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1257.271627] FAULT_INJECTION: forcing a failure. [ 1257.271627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1257.273786] FAULT_INJECTION: forcing a failure. [ 1257.273786] name failslab, interval 1, probability 0, space 0, times 0 [ 1257.273863] CPU: 1 PID: 10799 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1257.273868] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1257.273872] Call Trace: [ 1257.273888] dump_stack+0x107/0x167 [ 1257.273900] should_fail.cold+0x5/0xa [ 1257.273915] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1257.273929] should_failslab+0x5/0x20 [ 1257.273939] kmem_cache_alloc+0x5b/0x310 [ 1257.273953] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1257.273967] radix_tree_extend+0x231/0x490 [ 1257.273982] idr_get_free+0x623/0x8f0 [ 1257.274001] idr_alloc_u32+0x170/0x2d0 [ 1257.274013] ? __fprop_inc_percpu_max+0x130/0x130 [ 1257.274026] ? lock_acquire+0x197/0x470 [ 1257.274037] ? __kernfs_new_node+0xff/0x860 [ 1257.274052] idr_alloc_cyclic+0x102/0x230 [ 1257.274062] ? idr_alloc+0x130/0x130 [ 1257.274072] ? rwlock_bug.part.0+0x90/0x90 [ 1257.274089] __kernfs_new_node+0x117/0x860 [ 1257.274098] ? mark_held_locks+0x9e/0xe0 [ 1257.274110] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1257.274122] ? cpumask_next+0x1f/0x30 [ 1257.274133] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1257.274146] ? pcpu_alloc+0x12a/0x1240 [ 1257.274170] kernfs_new_node+0x18d/0x250 [ 1257.284909] kernfs_create_dir_ns+0x49/0x160 [ 1257.285273] cgroup_mkdir+0x318/0xf50 [ 1257.285590] ? cgroup_destroy_locked+0x710/0x710 [ 1257.285972] kernfs_iop_mkdir+0x14d/0x1e0 [ 1257.286307] vfs_mkdir+0x493/0x700 [ 1257.286597] do_mkdirat+0x150/0x2b0 [ 1257.286890] ? user_path_create+0xf0/0xf0 [ 1257.287227] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1257.287644] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1257.288057] do_syscall_64+0x33/0x40 [ 1257.288356] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1257.288766] RIP: 0033:0x7f70572c7b19 [ 1257.289063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1257.290525] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1257.291131] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1257.291694] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1257.292256] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1257.292816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1257.293375] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1257.293997] CPU: 0 PID: 10787 Comm: syz-executor.1 Not tainted 5.10.215 #1 [ 1257.295070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1257.296339] Call Trace: [ 1257.296750] dump_stack+0x107/0x167 [ 1257.297316] should_fail.cold+0x5/0xa [ 1257.297922] _copy_from_user+0x2e/0x1b0 [ 1257.298567] __copy_msghdr_from_user+0x91/0x4b0 [ 1257.299297] ? __ia32_sys_shutdown+0x80/0x80 [ 1257.299988] ? __lock_acquire+0xbb1/0x5b00 [ 1257.300656] sendmsg_copy_msghdr+0xa1/0x160 [ 1257.301326] ? do_recvmmsg+0x6d0/0x6d0 [ 1257.301945] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1257.302760] ? mark_lock+0xf5/0x2df0 [ 1257.303349] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1257.304161] ? __lock_acquire+0x1657/0x5b00 [ 1257.304851] ___sys_sendmsg+0xc6/0x170 [ 1257.305459] ? sendmsg_copy_msghdr+0x160/0x160 [ 1257.306180] ? __fget_files+0x26d/0x4c0 [ 1257.306804] ? lock_downgrade+0x6d0/0x6d0 [ 1257.307465] ? lock_downgrade+0x6d0/0x6d0 [ 1257.308115] ? __fget_files+0x296/0x4c0 [ 1257.308753] ? __fget_light+0xea/0x290 [ 1257.309367] __sys_sendmmsg+0x195/0x470 [ 1257.309999] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1257.310676] ? lock_downgrade+0x6d0/0x6d0 [ 1257.311335] ? ksys_write+0x12d/0x260 [ 1257.311938] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1257.312702] ? wait_for_completion_io+0x270/0x270 [ 1257.313455] ? rcu_read_lock_any_held+0x75/0xa0 [ 1257.314184] ? vfs_write+0x354/0xa70 [ 1257.314770] ? fput_many+0x2f/0x1a0 [ 1257.315336] ? ksys_write+0x1a9/0x260 [ 1257.315935] ? __ia32_sys_read+0xb0/0xb0 [ 1257.316572] __x64_sys_sendmmsg+0x99/0x100 [ 1257.317233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1257.318038] do_syscall_64+0x33/0x40 [ 1257.318620] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1257.319416] RIP: 0033:0x7f07513a6b19 [ 1257.320001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1257.322813] RSP: 002b:00007f074e91c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1257.323985] RAX: ffffffffffffffda RBX: 00007f07514b9f60 RCX: 00007f07513a6b19 [ 1257.325076] RDX: 000000000000002f RSI: 0000000020004d00 RDI: 0000000000000006 [ 1257.326178] RBP: 00007f074e91c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1257.327273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1257.328369] R13: 00007ffc581f169f R14: 00007f074e91c300 R15: 0000000000022000 05:02:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 1257.347560] FAULT_INJECTION: forcing a failure. [ 1257.347560] name failslab, interval 1, probability 0, space 0, times 0 [ 1257.348528] CPU: 1 PID: 10826 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1257.349079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1257.349743] Call Trace: [ 1257.349960] dump_stack+0x107/0x167 [ 1257.350253] should_fail.cold+0x5/0xa [ 1257.350563] ? dup_fd+0x89/0xcf0 [ 1257.350836] should_failslab+0x5/0x20 [ 1257.351142] kmem_cache_alloc+0x5b/0x310 [ 1257.351477] dup_fd+0x89/0xcf0 [ 1257.351737] ? audit_filter_inodes+0x40/0x40 [ 1257.352099] ? security_task_alloc+0xe6/0x260 [ 1257.352466] copy_process+0x197e/0x7800 [ 1257.352793] ? __lock_acquire+0xbb1/0x5b00 [ 1257.353145] ? __cleanup_sighand+0xb0/0xb0 [ 1257.353494] ? lock_acquire+0x197/0x470 [ 1257.353824] ? find_held_lock+0x2c/0x110 [ 1257.354151] kernel_clone+0xe7/0x980 [ 1257.354455] ? lock_downgrade+0x6d0/0x6d0 [ 1257.354792] ? find_held_lock+0x2c/0x110 [ 1257.355119] ? create_io_thread+0xf0/0xf0 [ 1257.355456] ? ksys_write+0x12d/0x260 [ 1257.355768] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1257.356156] __do_sys_fork+0x8a/0xc0 [ 1257.356460] ? kernel_thread+0xf0/0xf0 [ 1257.356781] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1257.357200] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1257.357620] ? trace_hardirqs_on+0x5b/0x180 [ 1257.357966] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1257.358377] do_syscall_64+0x33/0x40 [ 1257.358677] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1257.359092] RIP: 0033:0x7f171180fb19 [ 1257.359392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1257.360849] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1257.361458] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1257.362033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1257.362604] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1257.363172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1257.363748] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 05:02:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:02:53 executing program 1: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) (fail_nth: 2) 05:02:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 1) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:02:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x100000000000000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) [ 1257.455336] FAULT_INJECTION: forcing a failure. [ 1257.455336] name failslab, interval 1, probability 0, space 0, times 0 [ 1257.457554] CPU: 0 PID: 10904 Comm: syz-executor.1 Not tainted 5.10.215 #1 [ 1257.458638] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1257.459919] Call Trace: [ 1257.460338] dump_stack+0x107/0x167 [ 1257.460904] should_fail.cold+0x5/0xa [ 1257.461501] ? __alloc_skb+0x6d/0x5b0 [ 1257.462107] should_failslab+0x5/0x20 [ 1257.462706] kmem_cache_alloc_node+0x55/0x330 [ 1257.463409] __alloc_skb+0x6d/0x5b0 [ 1257.463978] alloc_skb_with_frags+0x92/0x570 [ 1257.464667] ? lock_chain_count+0x20/0x20 [ 1257.465313] sock_alloc_send_pskb+0x7af/0x930 [ 1257.466015] ? sk_alloc+0x350/0x350 [ 1257.466597] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1257.467414] ? lock_downgrade+0x6d0/0x6d0 [ 1257.468075] __ip_append_data+0x1628/0x3310 [ 1257.468759] ? fib_select_path+0x95d/0x1e90 [ 1257.469432] ? ip_frag_init+0x350/0x350 [ 1257.470065] ? ip_finish_output+0x330/0x330 [ 1257.470718] ? ip_route_output_key_hash+0x1a4/0x340 [ 1257.471492] ? __sock_tx_timestamp+0xa3/0xc0 [ 1257.472185] ip_make_skb+0x22a/0x2a0 [ 1257.472771] ? ip_frag_init+0x350/0x350 [ 1257.473393] ? ip_flush_pending_frames+0x20/0x20 [ 1257.474144] ? lock_downgrade+0x6d0/0x6d0 [ 1257.474796] ? xfrm_lookup_route+0x65/0x210 [ 1257.475475] udp_sendmsg+0x193f/0x2170 [ 1257.476095] ? ip_frag_init+0x350/0x350 [ 1257.476725] ? udp_setsockopt+0xc0/0xc0 [ 1257.477352] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1257.478183] ? __lock_acquire+0xbb1/0x5b00 [ 1257.478866] ? handle_mm_fault+0x1a0b/0x3500 [ 1257.479554] ? lock_downgrade+0x6d0/0x6d0 [ 1257.480207] ? do_raw_spin_lock+0x121/0x260 [ 1257.480887] ? rwlock_bug.part.0+0x90/0x90 [ 1257.481562] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1257.482390] udpv6_sendmsg+0x1b4e/0x2af0 [ 1257.483038] ? udp_v6_push_pending_frames+0x360/0x360 [ 1257.483843] ? _down_write_nest_lock+0x160/0x160 [ 1257.484585] ? vmacache_update+0xce/0x140 [ 1257.484643] FAULT_INJECTION: forcing a failure. [ 1257.484643] name failslab, interval 1, probability 0, space 0, times 0 [ 1257.485242] ? do_user_addr_fault+0x5b0/0xc60 [ 1257.485265] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1257.487604] ? exc_page_fault+0xca/0x1a0 [ 1257.488224] ? trace_hardirqs_on+0x5b/0x180 [ 1257.488896] ? exc_page_fault+0xca/0x1a0 [ 1257.489523] ? asm_exc_page_fault+0x1e/0x30 [ 1257.490199] ? sock_has_perm+0x1ea/0x280 [ 1257.490823] ? selinux_socket_post_create+0x7f0/0x7f0 [ 1257.491628] ? copy_user_generic_string+0x2c/0x40 [ 1257.492371] ? __import_iovec+0x458/0x590 [ 1257.493020] ? udp_v6_push_pending_frames+0x360/0x360 [ 1257.493821] inet6_sendmsg+0x105/0x140 [ 1257.494431] ? inet6_compat_ioctl+0x320/0x320 [ 1257.495113] __sock_sendmsg+0xf2/0x190 [ 1257.495719] ____sys_sendmsg+0x334/0x870 [ 1257.496346] ? sock_write_iter+0x3d0/0x3d0 [ 1257.497002] ? do_recvmmsg+0x6d0/0x6d0 [ 1257.497615] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1257.498427] ? mark_lock+0xf5/0x2df0 [ 1257.499003] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1257.499815] ? __lock_acquire+0x1657/0x5b00 [ 1257.500483] ___sys_sendmsg+0xf3/0x170 [ 1257.501093] ? sendmsg_copy_msghdr+0x160/0x160 [ 1257.501804] ? __fget_files+0x26d/0x4c0 [ 1257.502425] ? lock_downgrade+0x6d0/0x6d0 [ 1257.503066] ? lock_downgrade+0x6d0/0x6d0 [ 1257.503716] ? __fget_files+0x296/0x4c0 [ 1257.504336] ? __fget_light+0xea/0x290 [ 1257.504946] __sys_sendmmsg+0x195/0x470 [ 1257.505569] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1257.506245] ? lock_downgrade+0x6d0/0x6d0 [ 1257.506897] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1257.507651] ? wait_for_completion_io+0x270/0x270 [ 1257.508392] ? rcu_read_lock_any_held+0x75/0xa0 [ 1257.509115] ? vfs_write+0x354/0xa70 [ 1257.509691] ? fput_many+0x2f/0x1a0 [ 1257.510262] ? ksys_write+0x1a9/0x260 [ 1257.510845] ? __ia32_sys_read+0xb0/0xb0 [ 1257.511485] __x64_sys_sendmmsg+0x99/0x100 [ 1257.512132] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1257.512927] do_syscall_64+0x33/0x40 [ 1257.513495] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1257.514300] RIP: 0033:0x7f07513a6b19 [ 1257.514873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1257.517689] RSP: 002b:00007f074e91c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1257.518843] RAX: ffffffffffffffda RBX: 00007f07514b9f60 RCX: 00007f07513a6b19 [ 1257.519951] RDX: 000000000000002f RSI: 0000000020004d00 RDI: 0000000000000004 [ 1257.521052] RBP: 00007f074e91c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1257.522154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1257.523250] R13: 00007ffc581f169f R14: 00007f074e91c300 R15: 0000000000022000 [ 1257.524374] CPU: 1 PID: 10913 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 1257.524976] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1257.525644] Call Trace: [ 1257.525853] dump_stack+0x107/0x167 [ 1257.526138] should_fail.cold+0x5/0xa [ 1257.526445] ? getname_flags.part.0+0x50/0x4f0 [ 1257.526806] should_failslab+0x5/0x20 [ 1257.527105] kmem_cache_alloc+0x5b/0x310 [ 1257.527429] getname_flags.part.0+0x50/0x4f0 [ 1257.527778] getname_flags+0x9a/0xe0 [ 1257.528070] do_mkdirat+0x8f/0x2b0 [ 1257.528350] ? user_path_create+0xf0/0xf0 [ 1257.528672] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1257.529080] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1257.529490] do_syscall_64+0x33/0x40 [ 1257.529786] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1257.530193] RIP: 0033:0x7f88d6f02b19 [ 1257.530489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1257.531933] RSP: 002b:00007f88d4478188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1257.532535] RAX: ffffffffffffffda RBX: 00007f88d7015f60 RCX: 00007f88d6f02b19 [ 1257.533088] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1257.533648] RBP: 00007f88d44781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1257.534213] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1257.534779] R13: 00007fffa7fc81bf R14: 00007f88d4478300 R15: 0000000000022000 05:02:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:02:53 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:02:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 19) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 1257.689593] FAULT_INJECTION: forcing a failure. [ 1257.689593] name failslab, interval 1, probability 0, space 0, times 0 [ 1257.690542] CPU: 1 PID: 11023 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1257.691086] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1257.691738] Call Trace: [ 1257.691959] dump_stack+0x107/0x167 [ 1257.692250] should_fail.cold+0x5/0xa [ 1257.692559] ? create_object.isra.0+0x3a/0xa20 [ 1257.692927] should_failslab+0x5/0x20 [ 1257.693237] kmem_cache_alloc+0x5b/0x310 [ 1257.693572] ? stack_trace_consume_entry+0x160/0x160 [ 1257.693978] create_object.isra.0+0x3a/0xa20 [ 1257.694330] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1257.694729] kmem_cache_alloc+0x159/0x310 [ 1257.695067] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1257.695513] radix_tree_extend+0x231/0x490 [ 1257.695855] idr_get_free+0x623/0x8f0 [ 1257.696172] idr_alloc_u32+0x170/0x2d0 [ 1257.696483] ? __fprop_inc_percpu_max+0x130/0x130 [ 1257.696863] ? lock_acquire+0x197/0x470 [ 1257.697183] ? __kernfs_new_node+0xff/0x860 [ 1257.697533] idr_alloc_cyclic+0x102/0x230 [ 1257.697873] ? idr_alloc+0x130/0x130 [ 1257.698173] ? rwlock_bug.part.0+0x90/0x90 [ 1257.698520] __kernfs_new_node+0x117/0x860 [ 1257.698857] ? mark_held_locks+0x9e/0xe0 [ 1257.699180] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1257.699567] ? cpumask_next+0x1f/0x30 [ 1257.699874] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1257.700250] ? pcpu_alloc+0x12a/0x1240 [ 1257.700566] kernfs_new_node+0x18d/0x250 [ 1257.700893] kernfs_create_dir_ns+0x49/0x160 [ 1257.701245] cgroup_mkdir+0x318/0xf50 [ 1257.701562] ? cgroup_destroy_locked+0x710/0x710 [ 1257.701943] kernfs_iop_mkdir+0x14d/0x1e0 [ 1257.702277] vfs_mkdir+0x493/0x700 [ 1257.702567] do_mkdirat+0x150/0x2b0 [ 1257.702857] ? user_path_create+0xf0/0xf0 [ 1257.703191] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1257.703605] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1257.704019] do_syscall_64+0x33/0x40 [ 1257.704319] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1257.704718] RIP: 0033:0x7f70572c7b19 [ 1257.705015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1257.706472] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1257.707074] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1257.707633] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1257.708191] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1257.708754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1257.709315] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:03:07 executing program 1: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) (fail_nth: 3) 05:03:07 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 11) 05:03:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:03:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x200000000000000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:03:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:03:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 20) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:03:07 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:03:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 2) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1270.770543] audit: type=1326 audit(1713762187.186:171): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11033 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 [ 1270.778918] FAULT_INJECTION: forcing a failure. [ 1270.778918] name failslab, interval 1, probability 0, space 0, times 0 [ 1270.780301] CPU: 1 PID: 11044 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1270.781116] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1270.782088] Call Trace: [ 1270.782404] dump_stack+0x107/0x167 [ 1270.782828] should_fail.cold+0x5/0xa [ 1270.783274] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1270.783932] should_failslab+0x5/0x20 [ 1270.784366] kmem_cache_alloc+0x5b/0x310 [ 1270.784828] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1270.785467] idr_get_free+0x4b5/0x8f0 [ 1270.785917] idr_alloc_u32+0x170/0x2d0 [ 1270.786368] ? __fprop_inc_percpu_max+0x130/0x130 [ 1270.786512] FAULT_INJECTION: forcing a failure. [ 1270.786512] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1270.786907] ? lock_acquire+0x197/0x470 [ 1270.786923] ? __kernfs_new_node+0xff/0x860 [ 1270.786944] idr_alloc_cyclic+0x102/0x230 [ 1270.786959] ? idr_alloc+0x130/0x130 [ 1270.786973] ? rwlock_bug.part.0+0x90/0x90 [ 1270.786998] __kernfs_new_node+0x117/0x860 [ 1270.787011] ? mark_held_locks+0x9e/0xe0 [ 1270.787029] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1270.787046] ? cpumask_next+0x1f/0x30 [ 1270.787061] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1270.787079] ? pcpu_alloc+0x12a/0x1240 [ 1270.787103] kernfs_new_node+0x18d/0x250 [ 1270.787124] kernfs_create_dir_ns+0x49/0x160 [ 1270.787143] cgroup_mkdir+0x318/0xf50 [ 1270.787163] ? cgroup_destroy_locked+0x710/0x710 [ 1270.787180] kernfs_iop_mkdir+0x14d/0x1e0 [ 1270.787202] vfs_mkdir+0x493/0x700 [ 1270.796730] do_mkdirat+0x150/0x2b0 [ 1270.797146] ? user_path_create+0xf0/0xf0 [ 1270.797614] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1270.798215] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1270.798795] do_syscall_64+0x33/0x40 [ 1270.799216] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1270.799792] RIP: 0033:0x7f70572c7b19 [ 1270.800215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1270.802288] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1270.803135] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1270.803926] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1270.804717] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1270.805510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1270.806314] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1270.807144] CPU: 0 PID: 11042 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 1270.808243] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1270.809535] Call Trace: [ 1270.809982] dump_stack+0x107/0x167 [ 1270.810554] should_fail.cold+0x5/0xa [ 1270.811170] __alloc_pages_nodemask+0x182/0x600 [ 1270.811910] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1270.812863] ? kmem_cache_alloc+0x301/0x310 [ 1270.813559] alloc_pages_current+0x187/0x280 [ 1270.814281] allocate_slab+0x26f/0x380 [ 1270.814904] ___slab_alloc+0x470/0x700 [ 1270.815523] ? getname_flags.part.0+0x50/0x4f0 [ 1270.816246] ? ksys_write+0x21a/0x260 [ 1270.816846] ? getname_flags.part.0+0x50/0x4f0 [ 1270.817560] ? kmem_cache_alloc+0x301/0x310 [ 1270.818255] kmem_cache_alloc+0x301/0x310 [ 1270.818921] getname_flags.part.0+0x50/0x4f0 [ 1270.819009] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1270.819615] getname_flags+0x9a/0xe0 [ 1270.819636] do_mkdirat+0x8f/0x2b0 [ 1270.820679] EXT4-fs (loop5): group descriptors corrupted! [ 1270.821237] ? user_path_create+0xf0/0xf0 [ 1270.821263] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1270.823910] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1270.824724] do_syscall_64+0x33/0x40 [ 1270.825308] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1270.826130] RIP: 0033:0x7f88d6f02b19 [ 1270.826716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1270.829567] RSP: 002b:00007f88d4478188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1270.830749] RAX: ffffffffffffffda RBX: 00007f88d7015f60 RCX: 00007f88d6f02b19 [ 1270.831859] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1270.832960] RBP: 00007f88d44781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1270.834094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1270.835194] R13: 00007fffa7fc81bf R14: 00007f88d4478300 R15: 0000000000022000 [ 1270.838671] FAULT_INJECTION: forcing a failure. [ 1270.838671] name failslab, interval 1, probability 0, space 0, times 0 [ 1270.840739] CPU: 0 PID: 11041 Comm: syz-executor.1 Not tainted 5.10.215 #1 [ 1270.841843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1270.843145] Call Trace: [ 1270.843554] dump_stack+0x107/0x167 [ 1270.844139] should_fail.cold+0x5/0xa [ 1270.844741] ? create_object.isra.0+0x3a/0xa20 [ 1270.845477] should_failslab+0x5/0x20 [ 1270.846082] kmem_cache_alloc+0x5b/0x310 [ 1270.846726] create_object.isra.0+0x3a/0xa20 [ 1270.847424] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1270.848236] kmem_cache_alloc_node+0x169/0x330 [ 1270.848970] __alloc_skb+0x6d/0x5b0 [ 1270.849557] alloc_skb_with_frags+0x92/0x570 [ 1270.850280] ? lock_chain_count+0x20/0x20 [ 1270.850940] sock_alloc_send_pskb+0x7af/0x930 [ 1270.851664] ? sk_alloc+0x350/0x350 [ 1270.852254] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1270.853065] ? lock_downgrade+0x6d0/0x6d0 [ 1270.853751] __ip_append_data+0x1628/0x3310 [ 1270.854442] ? fib_select_path+0x95d/0x1e90 [ 1270.855127] ? ip_frag_init+0x350/0x350 [ 1270.855756] ? ip_finish_output+0x330/0x330 [ 1270.856431] ? ip_route_output_key_hash+0x1a4/0x340 [ 1270.857227] ? __sock_tx_timestamp+0xa3/0xc0 [ 1270.857954] ip_make_skb+0x22a/0x2a0 [ 1270.858543] ? ip_frag_init+0x350/0x350 [ 1270.859181] ? ip_flush_pending_frames+0x20/0x20 [ 1270.859925] ? lock_downgrade+0x6d0/0x6d0 [ 1270.860573] ? xfrm_lookup_route+0x65/0x210 [ 1270.861280] udp_sendmsg+0x193f/0x2170 [ 1270.861930] ? ip_frag_init+0x350/0x350 [ 1270.862591] ? udp_setsockopt+0xc0/0xc0 [ 1270.863221] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1270.864070] ? __lock_acquire+0xbb1/0x5b00 [ 1270.864788] ? handle_mm_fault+0x1a0b/0x3500 [ 1270.865485] ? lock_downgrade+0x6d0/0x6d0 [ 1270.866186] ? do_raw_spin_lock+0x121/0x260 [ 1270.866901] ? rwlock_bug.part.0+0x90/0x90 [ 1270.867593] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1270.868453] udpv6_sendmsg+0x1b4e/0x2af0 [ 1270.869133] ? udp_v6_push_pending_frames+0x360/0x360 [ 1270.869991] ? _down_write_nest_lock+0x160/0x160 [ 1270.870772] ? vmacache_update+0xce/0x140 [ 1270.871455] ? do_user_addr_fault+0x5b0/0xc60 [ 1270.872192] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1270.873040] ? exc_page_fault+0xca/0x1a0 [ 1270.873678] ? trace_hardirqs_on+0x5b/0x180 [ 1270.874397] ? exc_page_fault+0xca/0x1a0 [ 1270.875056] ? asm_exc_page_fault+0x1e/0x30 [ 1270.875756] ? sock_has_perm+0x1ea/0x280 [ 1270.876415] ? selinux_socket_post_create+0x7f0/0x7f0 [ 1270.877265] ? copy_user_generic_string+0x2c/0x40 [ 1270.878081] ? __import_iovec+0x458/0x590 [ 1270.878759] ? udp_v6_push_pending_frames+0x360/0x360 [ 1270.879596] inet6_sendmsg+0x105/0x140 [ 1270.880237] ? inet6_compat_ioctl+0x320/0x320 [ 1270.880961] __sock_sendmsg+0xf2/0x190 [ 1270.881591] ____sys_sendmsg+0x334/0x870 [ 1270.882254] ? sock_write_iter+0x3d0/0x3d0 [ 1270.882947] ? do_recvmmsg+0x6d0/0x6d0 [ 1270.883560] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1270.884410] ? mark_lock+0xf5/0x2df0 [ 1270.885003] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1270.885900] ? __lock_acquire+0x1657/0x5b00 [ 1270.886606] ___sys_sendmsg+0xf3/0x170 [ 1270.887245] ? sendmsg_copy_msghdr+0x160/0x160 [ 1270.887986] ? __fget_files+0x26d/0x4c0 [ 1270.888634] ? lock_downgrade+0x6d0/0x6d0 [ 1270.889318] ? lock_downgrade+0x6d0/0x6d0 [ 1270.890007] ? __fget_files+0x296/0x4c0 [ 1270.890667] ? __fget_light+0xea/0x290 [ 1270.891315] __sys_sendmmsg+0x195/0x470 [ 1270.891976] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1270.892672] ? lock_downgrade+0x6d0/0x6d0 [ 1270.893369] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1270.894186] ? wait_for_completion_io+0x270/0x270 [ 1270.894978] ? rcu_read_lock_any_held+0x75/0xa0 [ 1270.895736] ? vfs_write+0x354/0xa70 [ 1270.896346] ? fput_many+0x2f/0x1a0 [ 1270.896947] ? ksys_write+0x1a9/0x260 [ 1270.897563] ? __ia32_sys_read+0xb0/0xb0 [ 1270.898252] __x64_sys_sendmmsg+0x99/0x100 [ 1270.898944] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1270.899778] do_syscall_64+0x33/0x40 [ 1270.900369] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1270.901202] RIP: 0033:0x7f07513a6b19 [ 1270.901827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1270.904797] RSP: 002b:00007f074e91c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1270.906051] RAX: ffffffffffffffda RBX: 00007f07514b9f60 RCX: 00007f07513a6b19 [ 1270.907202] RDX: 000000000000002f RSI: 0000000020004d00 RDI: 0000000000000006 [ 1270.908357] RBP: 00007f074e91c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1270.909512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1270.910679] R13: 00007ffc581f169f R14: 00007f074e91c300 R15: 0000000000022000 [ 1270.929526] FAULT_INJECTION: forcing a failure. [ 1270.929526] name failslab, interval 1, probability 0, space 0, times 0 [ 1270.931428] CPU: 0 PID: 11122 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1270.932542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1270.933894] Call Trace: [ 1270.934326] dump_stack+0x107/0x167 [ 1270.934919] should_fail.cold+0x5/0xa [ 1270.935542] ? __delayacct_tsk_init+0x1b/0x80 [ 1270.936275] should_failslab+0x5/0x20 [ 1270.936908] kmem_cache_alloc+0x5b/0x310 [ 1270.937565] ? prepare_creds+0x466/0x5e0 [ 1270.938254] __delayacct_tsk_init+0x1b/0x80 [ 1270.938962] copy_process+0x3319/0x7800 [ 1270.939615] ? __lock_acquire+0xbb1/0x5b00 [ 1270.940323] ? lock_downgrade+0x6d0/0x6d0 [ 1270.941006] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1270.941892] ? __cleanup_sighand+0xb0/0xb0 [ 1270.942584] ? lock_acquire+0x197/0x470 [ 1270.943243] ? find_held_lock+0x2c/0x110 [ 1270.943910] kernel_clone+0xe7/0x980 [ 1270.944497] ? lock_downgrade+0x6d0/0x6d0 [ 1270.945174] ? find_held_lock+0x2c/0x110 [ 1270.945858] ? create_io_thread+0xf0/0xf0 [ 1270.946540] ? ksys_write+0x12d/0x260 [ 1270.947172] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1270.947968] __do_sys_fork+0x8a/0xc0 [ 1270.948575] ? kernel_thread+0xf0/0xf0 [ 1270.949227] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1270.950099] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1270.950936] ? trace_hardirqs_on+0x5b/0x180 [ 1270.951640] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1270.952476] do_syscall_64+0x33/0x40 [ 1270.953088] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1270.953942] RIP: 0033:0x7f171180fb19 [ 1270.954547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1270.957501] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1270.958754] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1270.959898] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1270.961042] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1270.962211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1270.963359] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 05:03:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400000000000000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:03:07 executing program 1: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) (fail_nth: 4) 05:03:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 21) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:03:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:03:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 3) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:03:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 1271.119389] FAULT_INJECTION: forcing a failure. [ 1271.119389] name failslab, interval 1, probability 0, space 0, times 0 [ 1271.120818] CPU: 1 PID: 11164 Comm: syz-executor.1 Not tainted 5.10.215 #1 [ 1271.121553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1271.122444] Call Trace: [ 1271.122737] dump_stack+0x107/0x167 [ 1271.123126] should_fail.cold+0x5/0xa [ 1271.123535] should_failslab+0x5/0x20 05:03:07 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000740)=@chain={'key_or_keyring:', r1}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1271.123943] __kmalloc_node_track_caller+0x74/0x3b0 [ 1271.124651] ? alloc_skb_with_frags+0x92/0x570 [ 1271.125138] __alloc_skb+0xb1/0x5b0 [ 1271.125527] alloc_skb_with_frags+0x92/0x570 [ 1271.126007] ? lock_chain_count+0x20/0x20 [ 1271.126449] sock_alloc_send_pskb+0x7af/0x930 [ 1271.126929] ? sk_alloc+0x350/0x350 [ 1271.127321] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1271.127873] ? lock_downgrade+0x6d0/0x6d0 [ 1271.128323] __ip_append_data+0x1628/0x3310 [ 1271.128786] ? fib_select_path+0x95d/0x1e90 [ 1271.129243] ? ip_frag_init+0x350/0x350 [ 1271.129668] ? ip_finish_output+0x330/0x330 [ 1271.130128] ? ip_route_output_key_hash+0x1a4/0x340 [ 1271.130651] ? __sock_tx_timestamp+0xa3/0xc0 [ 1271.131119] ip_make_skb+0x22a/0x2a0 [ 1271.131515] ? ip_frag_init+0x350/0x350 [ 1271.131920] ? ip_flush_pending_frames+0x20/0x20 [ 1271.132421] ? lock_downgrade+0x6d0/0x6d0 [ 1271.132864] ? xfrm_lookup_route+0x65/0x210 [ 1271.133307] udp_sendmsg+0x193f/0x2170 [ 1271.133729] ? ip_frag_init+0x350/0x350 [ 1271.134166] ? udp_setsockopt+0xc0/0xc0 [ 1271.134589] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1271.135146] ? __lock_acquire+0xbb1/0x5b00 [ 1271.135609] ? handle_mm_fault+0x1a0b/0x3500 [ 1271.136075] ? lock_downgrade+0x6d0/0x6d0 [ 1271.136514] ? do_raw_spin_lock+0x121/0x260 [ 1271.136971] ? rwlock_bug.part.0+0x90/0x90 [ 1271.137418] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1271.137982] udpv6_sendmsg+0x1b4e/0x2af0 [ 1271.138421] ? udp_v6_push_pending_frames+0x360/0x360 [ 1271.138963] ? _down_write_nest_lock+0x160/0x160 [ 1271.139466] ? vmacache_update+0xce/0x140 [ 1271.139913] ? do_user_addr_fault+0x5b0/0xc60 [ 1271.140389] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1271.140942] ? exc_page_fault+0xca/0x1a0 [ 1271.141370] ? trace_hardirqs_on+0x5b/0x180 [ 1271.141821] ? exc_page_fault+0xca/0x1a0 [ 1271.142239] ? asm_exc_page_fault+0x1e/0x30 [ 1271.142698] ? sock_has_perm+0x1ea/0x280 [ 1271.143124] ? selinux_socket_post_create+0x7f0/0x7f0 [ 1271.143670] ? copy_user_generic_string+0x2c/0x40 [ 1271.144182] ? __import_iovec+0x458/0x590 [ 1271.144615] ? udp_v6_push_pending_frames+0x360/0x360 [ 1271.145158] inet6_sendmsg+0x105/0x140 [ 1271.145566] ? inet6_compat_ioctl+0x320/0x320 [ 1271.146055] __sock_sendmsg+0xf2/0x190 [ 1271.146451] ____sys_sendmsg+0x334/0x870 [ 1271.146898] ? sock_write_iter+0x3d0/0x3d0 [ 1271.147356] ? do_recvmmsg+0x6d0/0x6d0 [ 1271.147784] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1271.148363] ? mark_lock+0xf5/0x2df0 [ 1271.148786] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1271.149356] ? __lock_acquire+0x1657/0x5b00 [ 1271.149840] ___sys_sendmsg+0xf3/0x170 [ 1271.150269] ? sendmsg_copy_msghdr+0x160/0x160 [ 1271.150779] ? __fget_files+0x26d/0x4c0 [ 1271.151218] ? lock_downgrade+0x6d0/0x6d0 [ 1271.151676] ? lock_downgrade+0x6d0/0x6d0 [ 1271.152131] ? __fget_files+0x296/0x4c0 [ 1271.152575] ? __fget_light+0xea/0x290 [ 1271.153010] __sys_sendmmsg+0x195/0x470 [ 1271.153454] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1271.153933] ? lock_downgrade+0x6d0/0x6d0 [ 1271.154401] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1271.154930] ? wait_for_completion_io+0x270/0x270 [ 1271.155458] ? rcu_read_lock_any_held+0x75/0xa0 [ 1271.155967] ? vfs_write+0x354/0xa70 [ 1271.156374] ? fput_many+0x2f/0x1a0 [ 1271.156746] ? ksys_write+0x1a9/0x260 [ 1271.157164] ? __ia32_sys_read+0xb0/0xb0 [ 1271.157581] __x64_sys_sendmmsg+0x99/0x100 [ 1271.158049] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1271.158610] do_syscall_64+0x33/0x40 [ 1271.159023] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1271.159586] RIP: 0033:0x7f07513a6b19 [ 1271.159997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1271.162018] RSP: 002b:00007f074e91c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1271.162852] RAX: ffffffffffffffda RBX: 00007f07514b9f60 RCX: 00007f07513a6b19 [ 1271.163627] RDX: 000000000000002f RSI: 0000000020004d00 RDI: 0000000000000004 [ 1271.164403] RBP: 00007f074e91c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1271.165172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1271.165954] R13: 00007ffc581f169f R14: 00007f074e91c300 R15: 0000000000022000 [ 1271.196902] FAULT_INJECTION: forcing a failure. [ 1271.196902] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1271.198241] CPU: 1 PID: 11196 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 1271.198954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1271.199801] Call Trace: [ 1271.200078] dump_stack+0x107/0x167 [ 1271.200456] should_fail.cold+0x5/0xa [ 1271.200846] strncpy_from_user+0x34/0x470 [ 1271.201276] getname_flags.part.0+0x95/0x4f0 [ 1271.201737] getname_flags+0x9a/0xe0 [ 1271.202121] do_mkdirat+0x8f/0x2b0 [ 1271.202485] ? user_path_create+0xf0/0xf0 [ 1271.202917] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1271.203469] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1271.204019] do_syscall_64+0x33/0x40 [ 1271.204416] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1271.204965] RIP: 0033:0x7f88d6f02b19 [ 1271.205360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1271.207323] RSP: 002b:00007f88d4478188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1271.208127] RAX: ffffffffffffffda RBX: 00007f88d7015f60 RCX: 00007f88d6f02b19 [ 1271.208889] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1271.209645] RBP: 00007f88d44781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1271.210408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1271.211107] R13: 00007fffa7fc81bf R14: 00007f88d4478300 R15: 0000000000022000 [ 1271.233385] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1271.235148] EXT4-fs (loop5): group descriptors corrupted! [ 1271.262285] FAULT_INJECTION: forcing a failure. [ 1271.262285] name failslab, interval 1, probability 0, space 0, times 0 [ 1271.263447] CPU: 1 PID: 11240 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1271.264151] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1271.264989] Call Trace: [ 1271.265261] dump_stack+0x107/0x167 [ 1271.265634] should_fail.cold+0x5/0xa [ 1271.266030] ? create_object.isra.0+0x3a/0xa20 [ 1271.266489] should_failslab+0x5/0x20 [ 1271.266862] kmem_cache_alloc+0x5b/0x310 [ 1271.267273] create_object.isra.0+0x3a/0xa20 [ 1271.267716] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1271.268216] __kmalloc_track_caller+0x177/0x370 [ 1271.268683] ? security_context_to_sid_core+0xb4/0x890 [ 1271.269198] kmemdup_nul+0x2d/0xa0 [ 1271.269557] security_context_to_sid_core+0xb4/0x890 [ 1271.270076] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 1271.270617] ? do_raw_spin_lock+0x121/0x260 [ 1271.271050] ? rwlock_bug.part.0+0x90/0x90 [ 1271.271472] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1271.271960] ? do_raw_spin_unlock+0x4f/0x220 [ 1271.272397] ? _raw_spin_unlock+0x1a/0x30 [ 1271.272800] security_context_to_sid+0x35/0x50 [ 1271.273261] selinux_kernfs_init_security+0x19d/0x4c0 [ 1271.273780] ? selinux_file_mprotect+0x610/0x610 [ 1271.274248] ? find_held_lock+0x2c/0x110 [ 1271.274645] ? __kernfs_new_node+0x2ad/0x860 [ 1271.275084] ? lock_downgrade+0x6d0/0x6d0 [ 1271.275487] ? rwlock_bug.part.0+0x90/0x90 [ 1271.275920] security_kernfs_init_security+0x4e/0xb0 [ 1271.276424] __kernfs_new_node+0x531/0x860 [ 1271.276848] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1271.277319] ? cpumask_next+0x1f/0x30 [ 1271.277706] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1271.278176] ? pcpu_alloc+0x12a/0x1240 [ 1271.278572] kernfs_new_node+0x18d/0x250 [ 1271.278985] kernfs_create_dir_ns+0x49/0x160 [ 1271.279430] cgroup_mkdir+0x318/0xf50 [ 1271.279814] ? cgroup_destroy_locked+0x710/0x710 [ 1271.280285] kernfs_iop_mkdir+0x14d/0x1e0 [ 1271.280701] vfs_mkdir+0x493/0x700 [ 1271.281059] do_mkdirat+0x150/0x2b0 [ 1271.281423] ? user_path_create+0xf0/0xf0 [ 1271.281843] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1271.282364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1271.282866] do_syscall_64+0x33/0x40 [ 1271.283237] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1271.283731] RIP: 0033:0x7f70572c7b19 [ 1271.284102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:03:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 1271.285922] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1271.286890] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1271.287566] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1271.288264] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1271.288940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1271.289638] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:03:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x1800000000000000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:03:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 22) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:03:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0xf6ffffff00000000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:03:21 executing program 1: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) (fail_nth: 5) 05:03:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:03:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:03:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:03:21 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', 0x0) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:03:21 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 12) [ 1285.358930] FAULT_INJECTION: forcing a failure. [ 1285.358930] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.359966] CPU: 1 PID: 11395 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 1285.360531] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1285.361196] Call Trace: [ 1285.361414] dump_stack+0x107/0x167 [ 1285.361715] should_fail.cold+0x5/0xa [ 1285.362029] ? __d_alloc+0x2a/0x990 [ 1285.362326] should_failslab+0x5/0x20 [ 1285.362628] kmem_cache_alloc+0x5b/0x310 [ 1285.362955] __d_alloc+0x2a/0x990 [ 1285.363240] ? dput+0x1ae/0xcd0 [ 1285.363518] d_alloc+0x46/0x1c0 [ 1285.363796] __lookup_hash+0xcc/0x190 [ 1285.364108] filename_create+0x186/0x4a0 [ 1285.364443] ? getname_flags.part.0+0x115/0x4f0 [ 1285.364824] ? filename_parentat+0x570/0x570 [ 1285.365194] ? getname_flags.part.0+0x1dd/0x4f0 [ 1285.365568] do_mkdirat+0xa2/0x2b0 [ 1285.365874] ? user_path_create+0xf0/0xf0 [ 1285.366209] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.366642] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1285.367072] do_syscall_64+0x33/0x40 [ 1285.367388] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1285.367813] RIP: 0033:0x7f88d6f02b19 [ 1285.368125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.369614] RSP: 002b:00007f88d4478188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1285.370236] RAX: ffffffffffffffda RBX: 00007f88d7015f60 RCX: 00007f88d6f02b19 [ 1285.370805] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1285.371393] RBP: 00007f88d44781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1285.371971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1285.372559] R13: 00007fffa7fc81bf R14: 00007f88d4478300 R15: 0000000000022000 [ 1285.387333] audit: type=1326 audit(1713762201.803:172): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11400 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 [ 1285.407659] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1285.427726] FAULT_INJECTION: forcing a failure. [ 1285.427726] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.428993] CPU: 1 PID: 11408 Comm: syz-executor.1 Not tainted 5.10.215 #1 [ 1285.429553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1285.430271] Call Trace: [ 1285.430510] dump_stack+0x107/0x167 [ 1285.430832] should_fail.cold+0x5/0xa [ 1285.431154] ? create_object.isra.0+0x3a/0xa20 [ 1285.431536] should_failslab+0x5/0x20 [ 1285.431861] kmem_cache_alloc+0x5b/0x310 [ 1285.432204] create_object.isra.0+0x3a/0xa20 [ 1285.432568] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1285.432985] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1285.433402] ? alloc_skb_with_frags+0x92/0x570 [ 1285.433782] __alloc_skb+0xb1/0x5b0 [ 1285.434091] alloc_skb_with_frags+0x92/0x570 [ 1285.434465] ? lock_chain_count+0x20/0x20 [ 1285.434811] sock_alloc_send_pskb+0x7af/0x930 [ 1285.435181] ? sk_alloc+0x350/0x350 [ 1285.435481] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1285.435911] ? lock_downgrade+0x6d0/0x6d0 [ 1285.436261] __ip_append_data+0x1628/0x3310 [ 1285.436620] ? fib_select_path+0x95d/0x1e90 [ 1285.436980] ? ip_frag_init+0x350/0x350 [ 1285.437325] ? ip_finish_output+0x330/0x330 [ 1285.437679] ? ip_route_output_key_hash+0x1a4/0x340 [ 1285.438098] ? __sock_tx_timestamp+0xa3/0xc0 [ 1285.438470] ip_make_skb+0x22a/0x2a0 [ 1285.438774] ? ip_frag_init+0x350/0x350 [ 1285.439112] ? ip_flush_pending_frames+0x20/0x20 [ 1285.439510] ? lock_downgrade+0x6d0/0x6d0 [ 1285.439858] ? xfrm_lookup_route+0x65/0x210 [ 1285.440220] udp_sendmsg+0x193f/0x2170 [ 1285.440540] ? ip_frag_init+0x350/0x350 [ 1285.440875] ? udp_setsockopt+0xc0/0xc0 [ 1285.441197] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1285.441642] ? __lock_acquire+0xbb1/0x5b00 [ 1285.442013] ? handle_mm_fault+0x1a0b/0x3500 [ 1285.442378] ? lock_downgrade+0x6d0/0x6d0 [ 1285.442722] ? do_raw_spin_lock+0x121/0x260 [ 1285.443087] ? rwlock_bug.part.0+0x90/0x90 [ 1285.443445] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.443884] udpv6_sendmsg+0x1b4e/0x2af0 [ 1285.444263] ? udp_v6_push_pending_frames+0x360/0x360 [ 1285.444810] ? _down_write_nest_lock+0x160/0x160 [ 1285.445213] ? vmacache_update+0xce/0x140 [ 1285.445550] ? do_user_addr_fault+0x5b0/0xc60 [ 1285.445935] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.446357] ? exc_page_fault+0xca/0x1a0 [ 1285.446690] ? trace_hardirqs_on+0x5b/0x180 [ 1285.447047] ? exc_page_fault+0xca/0x1a0 [ 1285.447380] ? asm_exc_page_fault+0x1e/0x30 [ 1285.447743] ? sock_has_perm+0x1ea/0x280 [ 1285.448078] ? selinux_socket_post_create+0x7f0/0x7f0 [ 1285.448506] ? copy_user_generic_string+0x2c/0x40 [ 1285.448903] ? __import_iovec+0x458/0x590 [ 1285.449245] ? udp_v6_push_pending_frames+0x360/0x360 [ 1285.449665] inet6_sendmsg+0x105/0x140 [ 1285.449985] ? inet6_compat_ioctl+0x320/0x320 [ 1285.450347] __sock_sendmsg+0xf2/0x190 [ 1285.450653] ____sys_sendmsg+0x334/0x870 [ 1285.450993] ? sock_write_iter+0x3d0/0x3d0 [ 1285.451338] ? do_recvmmsg+0x6d0/0x6d0 [ 1285.451664] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1285.452091] ? mark_lock+0xf5/0x2df0 [ 1285.452409] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1285.452828] ? __lock_acquire+0x1657/0x5b00 [ 1285.453179] ___sys_sendmsg+0xf3/0x170 [ 1285.453498] ? sendmsg_copy_msghdr+0x160/0x160 [ 1285.453878] ? __fget_files+0x26d/0x4c0 [ 1285.454209] ? lock_downgrade+0x6d0/0x6d0 [ 1285.454547] ? lock_downgrade+0x6d0/0x6d0 [ 1285.454896] ? __fget_files+0x296/0x4c0 [ 1285.455226] ? __fget_light+0xea/0x290 [ 1285.455545] __sys_sendmmsg+0x195/0x470 [ 1285.455880] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1285.456237] ? lock_downgrade+0x6d0/0x6d0 [ 1285.456579] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1285.456971] ? wait_for_completion_io+0x270/0x270 [ 1285.457365] ? rcu_read_lock_any_held+0x75/0xa0 [ 1285.457748] ? vfs_write+0x354/0xa70 [ 1285.458065] ? fput_many+0x2f/0x1a0 [ 1285.458358] ? ksys_write+0x1a9/0x260 [ 1285.458666] ? __ia32_sys_read+0xb0/0xb0 [ 1285.459005] __x64_sys_sendmmsg+0x99/0x100 [ 1285.459353] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1285.459775] do_syscall_64+0x33/0x40 [ 1285.460081] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1285.460503] RIP: 0033:0x7f07513a6b19 [ 1285.460810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.462316] RSP: 002b:00007f074e91c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1285.462949] RAX: ffffffffffffffda RBX: 00007f07514b9f60 RCX: 00007f07513a6b19 [ 1285.463530] RDX: 000000000000002f RSI: 0000000020004d00 RDI: 0000000000000006 [ 1285.464108] RBP: 00007f074e91c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1285.464682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1285.465242] R13: 00007ffc581f169f R14: 00007f074e91c300 R15: 0000000000022000 [ 1285.471087] FAULT_INJECTION: forcing a failure. [ 1285.471087] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.472103] CPU: 1 PID: 11413 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1285.472683] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1285.473395] Call Trace: [ 1285.473631] dump_stack+0x107/0x167 [ 1285.473957] should_fail.cold+0x5/0xa [ 1285.474283] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1285.474749] should_failslab+0x5/0x20 [ 1285.475066] kmem_cache_alloc+0x5b/0x310 [ 1285.475395] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1285.475859] idr_get_free+0x4b5/0x8f0 [ 1285.476186] idr_alloc_u32+0x170/0x2d0 [ 1285.476513] ? __fprop_inc_percpu_max+0x130/0x130 [ 1285.476906] ? lock_acquire+0x197/0x470 [ 1285.477234] ? __kernfs_new_node+0xff/0x860 [ 1285.477592] idr_alloc_cyclic+0x102/0x230 [ 1285.477942] ? idr_alloc+0x130/0x130 [ 1285.478245] ? rwlock_bug.part.0+0x90/0x90 [ 1285.478595] __kernfs_new_node+0x117/0x860 [ 1285.478947] ? mark_held_locks+0x9e/0xe0 [ 1285.479281] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1285.479670] ? cpumask_next+0x1f/0x30 [ 1285.479987] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1285.480372] ? pcpu_alloc+0x12a/0x1240 [ 1285.480697] kernfs_new_node+0x18d/0x250 [ 1285.481042] kernfs_create_dir_ns+0x49/0x160 [ 1285.481414] cgroup_mkdir+0x318/0xf50 [ 1285.481725] ? cgroup_destroy_locked+0x710/0x710 [ 1285.482129] kernfs_iop_mkdir+0x14d/0x1e0 [ 1285.482476] vfs_mkdir+0x493/0x700 [ 1285.482775] do_mkdirat+0x150/0x2b0 [ 1285.483081] ? user_path_create+0xf0/0xf0 [ 1285.483419] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.483843] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1285.484266] do_syscall_64+0x33/0x40 [ 1285.484562] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1285.484977] RIP: 0033:0x7f70572c7b19 [ 1285.485288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.486796] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1285.487410] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1285.487992] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1285.488568] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1285.489151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1285.489736] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1285.494403] FAULT_INJECTION: forcing a failure. [ 1285.494403] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.495358] CPU: 1 PID: 11483 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1285.495928] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1285.496598] Call Trace: [ 1285.496816] dump_stack+0x107/0x167 [ 1285.497122] should_fail.cold+0x5/0xa [ 1285.497432] ? copy_fs_struct+0x45/0x340 [ 1285.497771] should_failslab+0x5/0x20 [ 1285.498097] kmem_cache_alloc+0x5b/0x310 [ 1285.498441] copy_fs_struct+0x45/0x340 [ 1285.498763] copy_process+0x3435/0x7800 [ 1285.499100] ? __lock_acquire+0xbb1/0x5b00 [ 1285.499457] ? __cleanup_sighand+0xb0/0xb0 [ 1285.499809] ? lock_acquire+0x197/0x470 [ 1285.500146] ? find_held_lock+0x2c/0x110 [ 1285.500479] kernel_clone+0xe7/0x980 [ 1285.500796] ? lock_downgrade+0x6d0/0x6d0 [ 1285.501131] ? find_held_lock+0x2c/0x110 [ 1285.501463] ? create_io_thread+0xf0/0xf0 [ 1285.501811] ? ksys_write+0x12d/0x260 [ 1285.502145] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1285.502554] __do_sys_fork+0x8a/0xc0 [ 1285.502866] ? kernel_thread+0xf0/0xf0 [ 1285.503194] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.503621] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1285.504053] ? trace_hardirqs_on+0x5b/0x180 [ 1285.504410] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1285.504836] do_syscall_64+0x33/0x40 [ 1285.505143] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1285.505567] RIP: 0033:0x7f171180fb19 [ 1285.505910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.507402] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1285.508023] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1285.508595] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1285.509168] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1285.509759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1285.510353] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 05:03:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:03:21 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', 0x0) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:03:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:03:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 5) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:03:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 23) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) 05:03:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 1285.681231] FAULT_INJECTION: forcing a failure. [ 1285.681231] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.682434] CPU: 1 PID: 11526 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 1285.682997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1285.683664] Call Trace: [ 1285.683891] dump_stack+0x107/0x167 [ 1285.684192] should_fail.cold+0x5/0xa [ 1285.684514] ? create_object.isra.0+0x3a/0xa20 [ 1285.684895] should_failslab+0x5/0x20 [ 1285.685206] kmem_cache_alloc+0x5b/0x310 [ 1285.685542] create_object.isra.0+0x3a/0xa20 [ 1285.685914] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1285.686326] kmem_cache_alloc+0x159/0x310 [ 1285.686674] __d_alloc+0x2a/0x990 [ 1285.686959] ? dput+0x1ae/0xcd0 [ 1285.687236] d_alloc+0x46/0x1c0 [ 1285.687514] __lookup_hash+0xcc/0x190 [ 1285.687822] filename_create+0x186/0x4a0 [ 1285.688158] ? filename_parentat+0x570/0x570 [ 1285.688519] ? getname_flags.part.0+0x1dd/0x4f0 [ 1285.688907] do_mkdirat+0xa2/0x2b0 [ 1285.689202] ? user_path_create+0xf0/0xf0 [ 1285.689544] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.689976] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1285.690391] do_syscall_64+0x33/0x40 [ 1285.690715] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1285.691136] RIP: 0033:0x7f88d6f02b19 [ 1285.691438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.692930] RSP: 002b:00007f88d4478188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1285.693555] RAX: ffffffffffffffda RBX: 00007f88d7015f60 RCX: 00007f88d6f02b19 [ 1285.694131] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1285.694690] RBP: 00007f88d44781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1285.695273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1285.695832] R13: 00007fffa7fc81bf R14: 00007f88d4478300 R15: 0000000000022000 05:03:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 1285.755236] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 05:03:22 executing program 1: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) (fail_nth: 6) [ 1285.785305] FAULT_INJECTION: forcing a failure. [ 1285.785305] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.787279] CPU: 0 PID: 11552 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1285.788366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1285.789643] Call Trace: [ 1285.790067] dump_stack+0x107/0x167 [ 1285.790642] should_fail.cold+0x5/0xa [ 1285.791244] ? create_object.isra.0+0x3a/0xa20 [ 1285.791966] should_failslab+0x5/0x20 [ 1285.792573] kmem_cache_alloc+0x5b/0x310 [ 1285.793217] ? mark_held_locks+0x9e/0xe0 [ 1285.793859] create_object.isra.0+0x3a/0xa20 [ 1285.794562] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1285.795387] kmem_cache_alloc+0x159/0x310 [ 1285.796050] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1285.796944] idr_get_free+0x4b5/0x8f0 [ 1285.797546] idr_alloc_u32+0x170/0x2d0 [ 1285.798196] ? __fprop_inc_percpu_max+0x130/0x130 [ 1285.798950] ? lock_acquire+0x197/0x470 [ 1285.799592] ? __kernfs_new_node+0xff/0x860 [ 1285.800287] idr_alloc_cyclic+0x102/0x230 [ 1285.800940] ? idr_alloc+0x130/0x130 [ 1285.801533] ? rwlock_bug.part.0+0x90/0x90 [ 1285.802233] __kernfs_new_node+0x117/0x860 [ 1285.802906] ? mark_held_locks+0x9e/0xe0 [ 1285.803569] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1285.804324] ? cpumask_next+0x1f/0x30 [ 1285.804936] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1285.805668] ? pcpu_alloc+0x12a/0x1240 [ 1285.806316] kernfs_new_node+0x18d/0x250 [ 1285.806972] kernfs_create_dir_ns+0x49/0x160 [ 1285.807673] cgroup_mkdir+0x318/0xf50 [ 1285.808279] ? cgroup_destroy_locked+0x710/0x710 [ 1285.809018] kernfs_iop_mkdir+0x14d/0x1e0 [ 1285.809674] vfs_mkdir+0x493/0x700 [ 1285.810252] do_mkdirat+0x150/0x2b0 [ 1285.810830] ? user_path_create+0xf0/0xf0 [ 1285.811489] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.812308] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1285.813133] do_syscall_64+0x33/0x40 [ 1285.813734] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1285.814570] RIP: 0033:0x7f70572c7b19 [ 1285.815146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.818030] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1285.819220] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1285.820328] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1285.821434] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1285.822536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1285.823658] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:03:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 6) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:03:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f7123a089e0348d446c5e0c051f9dfe9"], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:03:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 24) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 1285.919239] FAULT_INJECTION: forcing a failure. [ 1285.919239] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.920377] CPU: 1 PID: 11647 Comm: syz-executor.1 Not tainted 5.10.215 #1 [ 1285.920942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1285.921611] Call Trace: [ 1285.921828] dump_stack+0x107/0x167 [ 1285.922142] should_fail.cold+0x5/0xa [ 1285.922465] ? skb_clone+0x14f/0x3d0 [ 1285.922766] should_failslab+0x5/0x20 [ 1285.923092] kmem_cache_alloc+0x5b/0x310 [ 1285.923434] skb_clone+0x14f/0x3d0 [ 1285.923723] __skb_tstamp_tx+0x422/0x8d0 [ 1285.924070] __dev_queue_xmit+0x1770/0x2710 [ 1285.924435] ? find_held_lock+0x2c/0x110 [ 1285.924781] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 1285.925137] ? lock_downgrade+0x6d0/0x6d0 [ 1285.925477] ? lock_acquire+0x197/0x470 [ 1285.925823] ? ip_finish_output2+0x220/0x21f0 [ 1285.926217] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 1285.926659] neigh_connected_output+0x382/0x4d0 [ 1285.927052] ip_finish_output2+0x6f1/0x21f0 [ 1285.927400] ? nf_hook_slow+0xfc/0x1e0 [ 1285.927712] ? ip_frag_next+0x9e0/0x9e0 [ 1285.928047] ? nf_hook+0x160/0x510 [ 1285.928352] ? __ip_finish_output.part.0+0xb50/0xb50 [ 1285.928758] __ip_finish_output.part.0+0x5f3/0xb50 [ 1285.929163] ? ip_fragment.constprop.0+0x240/0x240 [ 1285.929573] ? nf_hook+0x510/0x510 [ 1285.929890] ip_output+0x2f7/0x600 [ 1285.930193] ip_send_skb+0xdd/0x260 [ 1285.930505] udp_send_skb+0x6da/0x11d0 [ 1285.930832] udp_sendmsg+0x197f/0x2170 [ 1285.931145] ? ip_frag_init+0x350/0x350 [ 1285.931482] ? udp_setsockopt+0xc0/0xc0 [ 1285.931822] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1285.932252] ? __lock_acquire+0xbb1/0x5b00 [ 1285.932614] ? handle_mm_fault+0x1a0b/0x3500 [ 1285.932970] ? lock_downgrade+0x6d0/0x6d0 [ 1285.933320] ? do_raw_spin_lock+0x121/0x260 [ 1285.933683] ? rwlock_bug.part.0+0x90/0x90 [ 1285.934046] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.934496] udpv6_sendmsg+0x1b4e/0x2af0 [ 1285.934836] ? udp_v6_push_pending_frames+0x360/0x360 [ 1285.935263] ? _down_write_nest_lock+0x160/0x160 [ 1285.935639] ? vmacache_update+0xce/0x140 [ 1285.935989] ? do_user_addr_fault+0x5b0/0xc60 [ 1285.936356] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.936786] ? exc_page_fault+0xca/0x1a0 [ 1285.937134] ? trace_hardirqs_on+0x5b/0x180 [ 1285.937479] ? exc_page_fault+0xca/0x1a0 [ 1285.937811] ? asm_exc_page_fault+0x1e/0x30 [ 1285.938174] ? sock_has_perm+0x1ea/0x280 [ 1285.938492] ? selinux_socket_post_create+0x7f0/0x7f0 [ 1285.938929] ? copy_user_generic_string+0x2c/0x40 [ 1285.939333] ? __import_iovec+0x458/0x590 [ 1285.939675] ? udp_v6_push_pending_frames+0x360/0x360 [ 1285.940106] inet6_sendmsg+0x105/0x140 [ 1285.940428] ? inet6_compat_ioctl+0x320/0x320 [ 1285.940798] __sock_sendmsg+0xf2/0x190 [ 1285.941124] ____sys_sendmsg+0x334/0x870 [ 1285.941463] ? sock_write_iter+0x3d0/0x3d0 [ 1285.941816] ? do_recvmmsg+0x6d0/0x6d0 [ 1285.942146] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1285.942571] ? mark_lock+0xf5/0x2df0 [ 1285.942887] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1285.943306] ? __lock_acquire+0x1657/0x5b00 [ 1285.943663] ___sys_sendmsg+0xf3/0x170 [ 1285.943983] ? sendmsg_copy_msghdr+0x160/0x160 [ 1285.944353] ? __fget_files+0x26d/0x4c0 [ 1285.944678] ? lock_downgrade+0x6d0/0x6d0 [ 1285.945021] ? lock_downgrade+0x6d0/0x6d0 [ 1285.945371] ? __fget_files+0x296/0x4c0 [ 1285.945706] ? __fget_light+0xea/0x290 [ 1285.946028] __sys_sendmmsg+0x195/0x470 [ 1285.946358] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1285.946724] ? lock_downgrade+0x6d0/0x6d0 [ 1285.947093] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1285.947492] ? wait_for_completion_io+0x270/0x270 [ 1285.947893] ? rcu_read_lock_any_held+0x75/0xa0 [ 1285.948278] ? vfs_write+0x354/0xa70 [ 1285.948582] ? fput_many+0x2f/0x1a0 [ 1285.948882] ? ksys_write+0x1a9/0x260 [ 1285.949201] ? __ia32_sys_read+0xb0/0xb0 [ 1285.949532] __x64_sys_sendmmsg+0x99/0x100 [ 1285.949893] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1285.950059] FAULT_INJECTION: forcing a failure. [ 1285.950059] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.950312] do_syscall_64+0x33/0x40 [ 1285.950332] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1285.952800] RIP: 0033:0x7f07513a6b19 [ 1285.953121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.954617] RSP: 002b:00007f074e91c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1285.955239] RAX: ffffffffffffffda RBX: 00007f07514b9f60 RCX: 00007f07513a6b19 [ 1285.955821] RDX: 000000000000002f RSI: 0000000020004d00 RDI: 0000000000000006 [ 1285.956414] RBP: 00007f074e91c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1285.956992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1285.957566] R13: 00007ffc581f169f R14: 00007f074e91c300 R15: 0000000000022000 [ 1285.958171] CPU: 0 PID: 11618 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 1285.959311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1285.960620] Call Trace: [ 1285.961044] dump_stack+0x107/0x167 [ 1285.961638] should_fail.cold+0x5/0xa [ 1285.962248] ? cgroup_mkdir+0x254/0xf50 [ 1285.962869] should_failslab+0x5/0x20 [ 1285.963466] __kmalloc+0x72/0x390 [ 1285.964044] cgroup_mkdir+0x254/0xf50 [ 1285.964650] ? cgroup_destroy_locked+0x710/0x710 [ 1285.965417] kernfs_iop_mkdir+0x14d/0x1e0 [ 1285.966071] vfs_mkdir+0x493/0x700 [ 1285.966630] do_mkdirat+0x150/0x2b0 [ 1285.967211] ? user_path_create+0xf0/0xf0 [ 1285.967860] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.968680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1285.969475] do_syscall_64+0x33/0x40 [ 1285.970065] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1285.970857] RIP: 0033:0x7f88d6f02b19 [ 1285.971434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.974293] RSP: 002b:00007f88d4478188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1285.975509] RAX: ffffffffffffffda RBX: 00007f88d7015f60 RCX: 00007f88d6f02b19 [ 1285.976655] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1285.977784] RBP: 00007f88d44781d0 R08: 0000000000000000 R09: 0000000000000000 [ 1285.978900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1285.980029] R13: 00007fffa7fc81bf R14: 00007f88d4478300 R15: 0000000000022000 05:03:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:03:22 executing program 1: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) (fail_nth: 7) 05:03:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:03:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 1286.098641] FAULT_INJECTION: forcing a failure. [ 1286.098641] name failslab, interval 1, probability 0, space 0, times 0 [ 1286.100493] CPU: 0 PID: 11654 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1286.101576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1286.102887] Call Trace: [ 1286.103311] dump_stack+0x107/0x167 [ 1286.103895] should_fail.cold+0x5/0xa [ 1286.104503] ? selinux_kernfs_init_security+0x137/0x4c0 [ 1286.105354] should_failslab+0x5/0x20 [ 1286.105972] __kmalloc+0x72/0x390 [ 1286.106365] FAULT_INJECTION: forcing a failure. [ 1286.106365] name failslab, interval 1, probability 0, space 0, times 0 [ 1286.106528] selinux_kernfs_init_security+0x137/0x4c0 [ 1286.108248] ? selinux_file_mprotect+0x610/0x610 [ 1286.108994] ? find_held_lock+0x2c/0x110 [ 1286.109645] ? __kernfs_new_node+0x2ad/0x860 [ 1286.110345] ? lock_downgrade+0x6d0/0x6d0 [ 1286.111015] ? rwlock_bug.part.0+0x90/0x90 [ 1286.111697] security_kernfs_init_security+0x4e/0xb0 [ 1286.112491] __kernfs_new_node+0x531/0x860 [ 1286.113177] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1286.113919] ? cpumask_next+0x1f/0x30 [ 1286.114522] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1286.115274] ? pcpu_alloc+0x12a/0x1240 [ 1286.115902] kernfs_new_node+0x18d/0x250 [ 1286.116545] kernfs_create_dir_ns+0x49/0x160 [ 1286.117244] cgroup_mkdir+0x318/0xf50 [ 1286.117861] ? cgroup_destroy_locked+0x710/0x710 [ 1286.118631] kernfs_iop_mkdir+0x14d/0x1e0 [ 1286.119286] vfs_mkdir+0x493/0x700 [ 1286.119852] do_mkdirat+0x150/0x2b0 [ 1286.120436] ? user_path_create+0xf0/0xf0 [ 1286.121102] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1286.121929] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1286.122740] do_syscall_64+0x33/0x40 [ 1286.123338] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1286.124139] RIP: 0033:0x7f70572c7b19 [ 1286.124723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1286.127628] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1286.128818] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1286.129936] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1286.131045] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1286.132151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1286.133272] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1286.134419] CPU: 1 PID: 11667 Comm: syz-executor.1 Not tainted 5.10.215 #1 [ 1286.135001] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1286.135662] Call Trace: [ 1286.135895] dump_stack+0x107/0x167 [ 1286.136189] should_fail.cold+0x5/0xa [ 1286.136498] ? ___slab_alloc+0x155/0x700 [ 1286.136833] ? create_object.isra.0+0x3a/0xa20 [ 1286.137209] should_failslab+0x5/0x20 [ 1286.137530] kmem_cache_alloc+0x5b/0x310 [ 1286.137858] ? mark_lock+0xf5/0x2df0 [ 1286.138173] create_object.isra.0+0x3a/0xa20 [ 1286.138527] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1286.138950] kmem_cache_alloc+0x159/0x310 [ 1286.139292] skb_clone+0x14f/0x3d0 [ 1286.139578] __skb_tstamp_tx+0x422/0x8d0 [ 1286.139923] __dev_queue_xmit+0x1770/0x2710 [ 1286.140281] ? find_held_lock+0x2c/0x110 [ 1286.140624] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 1286.141000] ? lock_downgrade+0x6d0/0x6d0 [ 1286.141332] ? lock_acquire+0x197/0x470 [ 1286.141664] ? ip_finish_output2+0x220/0x21f0 [ 1286.142035] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 1286.142466] neigh_connected_output+0x382/0x4d0 [ 1286.142868] ip_finish_output2+0x6f1/0x21f0 [ 1286.143224] ? nf_hook_slow+0xfc/0x1e0 [ 1286.143549] ? ip_frag_next+0x9e0/0x9e0 [ 1286.143875] ? nf_hook+0x160/0x510 [ 1286.144171] ? __ip_finish_output.part.0+0xb50/0xb50 [ 1286.144576] __ip_finish_output.part.0+0x5f3/0xb50 [ 1286.144978] ? ip_fragment.constprop.0+0x240/0x240 [ 1286.145369] ? nf_hook+0x510/0x510 [ 1286.145672] ip_output+0x2f7/0x600 [ 1286.145974] ip_send_skb+0xdd/0x260 [ 1286.146277] udp_send_skb+0x6da/0x11d0 [ 1286.146612] udp_sendmsg+0x197f/0x2170 [ 1286.146928] ? ip_frag_init+0x350/0x350 [ 1286.147257] ? udp_setsockopt+0xc0/0xc0 [ 1286.147583] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1286.148012] ? __lock_acquire+0xbb1/0x5b00 [ 1286.148375] ? handle_mm_fault+0x1a0b/0x3500 [ 1286.148728] ? lock_downgrade+0x6d0/0x6d0 [ 1286.149071] ? do_raw_spin_lock+0x121/0x260 [ 1286.149416] ? rwlock_bug.part.0+0x90/0x90 [ 1286.149774] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1286.150217] udpv6_sendmsg+0x1b4e/0x2af0 [ 1286.150564] ? udp_v6_push_pending_frames+0x360/0x360 [ 1286.150970] ? _down_write_nest_lock+0x160/0x160 [ 1286.151365] ? vmacache_update+0xce/0x140 [ 1286.151704] ? do_user_addr_fault+0x5b0/0xc60 [ 1286.152082] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1286.152518] ? exc_page_fault+0xca/0x1a0 [ 1286.152853] ? trace_hardirqs_on+0x5b/0x180 [ 1286.153200] ? exc_page_fault+0xca/0x1a0 [ 1286.153533] ? asm_exc_page_fault+0x1e/0x30 [ 1286.153891] ? sock_has_perm+0x1ea/0x280 [ 1286.154233] ? selinux_socket_post_create+0x7f0/0x7f0 [ 1286.154661] ? copy_user_generic_string+0x2c/0x40 [ 1286.155064] ? __import_iovec+0x458/0x590 [ 1286.155399] ? udp_v6_push_pending_frames+0x360/0x360 [ 1286.155812] inet6_sendmsg+0x105/0x140 [ 1286.156139] ? inet6_compat_ioctl+0x320/0x320 [ 1286.156499] __sock_sendmsg+0xf2/0x190 [ 1286.156825] ____sys_sendmsg+0x334/0x870 [ 1286.157148] ? sock_write_iter+0x3d0/0x3d0 [ 1286.157494] ? do_recvmmsg+0x6d0/0x6d0 [ 1286.157814] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1286.158247] ? mark_lock+0xf5/0x2df0 [ 1286.158553] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1286.158983] ? __lock_acquire+0x1657/0x5b00 [ 1286.159333] ___sys_sendmsg+0xf3/0x170 [ 1286.159653] ? sendmsg_copy_msghdr+0x160/0x160 [ 1286.160032] ? __fget_files+0x26d/0x4c0 [ 1286.160358] ? lock_downgrade+0x6d0/0x6d0 [ 1286.160692] ? lock_downgrade+0x6d0/0x6d0 [ 1286.161038] ? __fget_files+0x296/0x4c0 [ 1286.161369] ? __fget_light+0xea/0x290 [ 1286.161697] __sys_sendmmsg+0x195/0x470 [ 1286.162037] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1286.162391] ? lock_downgrade+0x6d0/0x6d0 [ 1286.162729] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1286.163124] ? wait_for_completion_io+0x270/0x270 [ 1286.163524] ? rcu_read_lock_any_held+0x75/0xa0 [ 1286.163901] ? vfs_write+0x354/0xa70 [ 1286.164207] ? fput_many+0x2f/0x1a0 [ 1286.164504] ? ksys_write+0x1a9/0x260 [ 1286.164821] ? __ia32_sys_read+0xb0/0xb0 [ 1286.165158] __x64_sys_sendmmsg+0x99/0x100 [ 1286.165511] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1286.165947] do_syscall_64+0x33/0x40 [ 1286.166256] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1286.166675] RIP: 0033:0x7f07513a6b19 [ 1286.166981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1286.168486] RSP: 002b:00007f074e91c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1286.169113] RAX: ffffffffffffffda RBX: 00007f07514b9f60 RCX: 00007f07513a6b19 [ 1286.169684] RDX: 000000000000002f RSI: 0000000020004d00 RDI: 0000000000000006 [ 1286.170264] RBP: 00007f074e91c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1286.170843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1286.171419] R13: 00007ffc581f169f R14: 00007f074e91c300 R15: 0000000000022000 [ 1286.246922] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 05:03:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 25) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 1299.695867] audit: type=1326 audit(1713762216.108:173): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11778 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f171180fb19 code=0x0 05:03:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) 05:03:36 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038679de021f8c801000000000000009d1fa459d07100000000bc7ae631f7a54805ff070000000000093393d0e1c7391515c7ab7c8e0600", 0x27}, 0xffffff93, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000580)={0x0, "eb69407242322bd2c68557ea852c8bb47f31ea549b6a921e231e007ee0f7fca6200000000001000004000000000000009ef5702e8d50937e00"}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='{{@\x04\\+\x00', 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000080)="a3", 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000780)='dns_resolver\x00', 0x0) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8917, &(0x7f00000001c0)={'sit0\x00', {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:03:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 05:03:36 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pwrite64(r0, &(0x7f0000000080)="c71f6109924ad70b01f04a4063c851052dd49cae58d4ff294de95349c16abe3a9eeb9fffe475c9c71506b2f52afb52e64abb34155263748c3bae49bf8f3a993dcd361c7a903fb135906cfb510ec00057fc373c0c7c7fe7ad0609d020d03e5af70d1eaa977ae50f33f9bf8646a64aeaaa3cc7e3caa4b52240f09027c1ac91bf7d805606d90125f65ee87516ec65820e413577b76030600d2002d34d65bbe04ee15cae7062f689af545ff2065e934dec4e7ed055b53f91d7b8935632b3f86ab31b46d7e46d", 0xc4, 0xb9) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 13) 05:03:36 executing program 1: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x113685, 0x11) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f00000001c0)={0xb, 0x0, 0x874}) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x1) socket$inet_icmp(0x2, 0x2, 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x4, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmmsg$inet6(r1, &(0x7f0000004d00), 0x2f, 0x0) (fail_nth: 8) 05:03:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x8) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 05:03:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 7) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 1299.704575] FAULT_INJECTION: forcing a failure. [ 1299.704575] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.705770] CPU: 1 PID: 11775 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1299.706328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1299.706944] Call Trace: [ 1299.707153] dump_stack+0x107/0x167 [ 1299.707427] should_fail.cold+0x5/0xa [ 1299.707717] ? create_object.isra.0+0x3a/0xa20 [ 1299.708059] should_failslab+0x5/0x20 [ 1299.708346] kmem_cache_alloc+0x5b/0x310 [ 1299.708655] ? find_held_lock+0x2c/0x110 [ 1299.708987] create_object.isra.0+0x3a/0xa20 [ 1299.709317] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1299.709726] kmem_cache_alloc+0x159/0x310 [ 1299.710052] __kernfs_iattrs+0xbc/0x470 [ 1299.710353] kernfs_xattr_set+0x2b/0x80 [ 1299.710681] selinux_kernfs_init_security+0x26d/0x4c0 [ 1299.711065] ? selinux_file_mprotect+0x610/0x610 [ 1299.711447] ? find_held_lock+0x2c/0x110 [ 1299.711758] ? __kernfs_new_node+0x2ad/0x860 [ 1299.712087] ? rwlock_bug.part.0+0x90/0x90 [ 1299.712435] security_kernfs_init_security+0x4e/0xb0 [ 1299.712812] __kernfs_new_node+0x531/0x860 [ 1299.713159] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1299.713512] ? cpumask_next+0x1f/0x30 [ 1299.713799] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1299.714182] ? pcpu_alloc+0x12a/0x1240 [ 1299.714504] kernfs_new_node+0x18d/0x250 [ 1299.714843] kernfs_create_dir_ns+0x49/0x160 [ 1299.715202] cgroup_mkdir+0x318/0xf50 [ 1299.715515] ? cgroup_destroy_locked+0x710/0x710 [ 1299.715900] kernfs_iop_mkdir+0x14d/0x1e0 [ 1299.716239] vfs_mkdir+0x493/0x700 [ 1299.716514] do_mkdirat+0x150/0x2b0 [ 1299.716812] ? user_path_create+0xf0/0xf0 [ 1299.717154] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1299.717550] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.717972] do_syscall_64+0x33/0x40 [ 1299.718258] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1299.718639] RIP: 0033:0x7f70572c7b19 [ 1299.718921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1299.720384] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1299.720995] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1299.721564] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1299.722140] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1299.722713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1299.723284] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 [ 1299.742141] FAULT_INJECTION: forcing a failure. [ 1299.742141] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.743214] CPU: 1 PID: 11783 Comm: syz-executor.1 Not tainted 5.10.215 #1 [ 1299.743770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1299.744450] Call Trace: [ 1299.744670] dump_stack+0x107/0x167 [ 1299.744974] should_fail.cold+0x5/0xa [ 1299.745266] ? dst_alloc+0x9e/0x5d0 [ 1299.745560] should_failslab+0x5/0x20 [ 1299.745877] kmem_cache_alloc+0x5b/0x310 [ 1299.746204] dst_alloc+0x9e/0x5d0 [ 1299.746491] rt_dst_alloc+0x73/0x440 [ 1299.746783] ip_route_output_key_hash_rcu+0x93d/0x2a90 [ 1299.747216] ip_route_output_key_hash+0x18d/0x340 [ 1299.747617] ? ip_route_output_key_hash_rcu+0x2a90/0x2a90 [ 1299.748034] ? mark_lock+0xf5/0x2df0 [ 1299.748340] ip_route_output_flow+0x23/0x150 [ 1299.748699] ip_tunnel_xmit+0x70e/0x2f40 [ 1299.749024] ? ip_md_tunnel_xmit+0x1840/0x1840 [ 1299.749415] sit_tunnel_xmit+0xef0/0x2960 [ 1299.749754] ? lock_downgrade+0x6d0/0x6d0 [ 1299.750086] ? ipip_rcv+0x4f0/0x4f0 [ 1299.750387] ? skb_crc32c_csum_help+0x80/0x80 [ 1299.750748] ? lock_acquire+0x197/0x470 [ 1299.751068] ? __dev_queue_xmit+0x1c2/0x2710 [ 1299.751425] ? netif_skb_features+0x373/0xbe0 [ 1299.751792] dev_hard_start_xmit+0x1cb/0x6f0 [ 1299.752123] __dev_queue_xmit+0x17ec/0x2710 [ 1299.752475] ? find_held_lock+0x2c/0x110 [ 1299.752784] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 1299.753154] ? lock_downgrade+0x6d0/0x6d0 [ 1299.753470] ? lock_acquire+0x197/0x470 [ 1299.753790] ? ip_finish_output2+0x220/0x21f0 [ 1299.754170] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 1299.754598] neigh_connected_output+0x382/0x4d0 [ 1299.754957] ip_finish_output2+0x6f1/0x21f0 [ 1299.755308] ? nf_hook_slow+0xfc/0x1e0 [ 1299.755604] ? ip_frag_next+0x9e0/0x9e0 [ 1299.755905] ? nf_hook+0x160/0x510 [ 1299.756194] ? __ip_finish_output.part.0+0xb50/0xb50 [ 1299.756577] __ip_finish_output.part.0+0x5f3/0xb50 [ 1299.756974] ? ip_fragment.constprop.0+0x240/0x240 [ 1299.757341] ? nf_hook+0x510/0x510 [ 1299.757614] ip_output+0x2f7/0x600 [ 1299.757720] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1299.757906] ip_send_skb+0xdd/0x260 [ 1299.757925] udp_send_skb+0x6da/0x11d0 [ 1299.757941] udp_sendmsg+0x197f/0x2170 [ 1299.757958] ? ip_frag_init+0x350/0x350 [ 1299.759883] ? udp_setsockopt+0xc0/0xc0 [ 1299.760206] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1299.760600] ? __lock_acquire+0xbb1/0x5b00 [ 1299.760953] ? handle_mm_fault+0x1a0b/0x3500 [ 1299.761306] ? lock_downgrade+0x6d0/0x6d0 [ 1299.761644] ? do_raw_spin_lock+0x121/0x260 [ 1299.761994] ? rwlock_bug.part.0+0x90/0x90 [ 1299.762319] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1299.762751] udpv6_sendmsg+0x1b4e/0x2af0 [ 1299.763090] ? udp_v6_push_pending_frames+0x360/0x360 [ 1299.763508] ? _down_write_nest_lock+0x160/0x160 [ 1299.763892] ? vmacache_update+0xce/0x140 [ 1299.764231] ? do_user_addr_fault+0x5b0/0xc60 [ 1299.764594] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1299.764986] ? exc_page_fault+0xca/0x1a0 [ 1299.765290] ? trace_hardirqs_on+0x5b/0x180 [ 1299.765640] ? exc_page_fault+0xca/0x1a0 [ 1299.765941] ? asm_exc_page_fault+0x1e/0x30 [ 1299.766293] ? sock_has_perm+0x1ea/0x280 [ 1299.766604] ? selinux_socket_post_create+0x7f0/0x7f0 [ 1299.767023] ? copy_user_generic_string+0x2c/0x40 [ 1299.767390] ? __import_iovec+0x458/0x590 [ 1299.767723] ? udp_v6_push_pending_frames+0x360/0x360 [ 1299.768143] inet6_sendmsg+0x105/0x140 [ 1299.768434] ? inet6_compat_ioctl+0x320/0x320 [ 1299.768800] __sock_sendmsg+0xf2/0x190 [ 1299.769115] ____sys_sendmsg+0x334/0x870 [ 1299.769423] ? sock_write_iter+0x3d0/0x3d0 [ 1299.769765] ? do_recvmmsg+0x6d0/0x6d0 [ 1299.770065] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1299.770485] ? mark_lock+0xf5/0x2df0 [ 1299.770769] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1299.771189] ? __lock_acquire+0x1657/0x5b00 [ 1299.771516] ___sys_sendmsg+0xf3/0x170 [ 1299.771838] ? sendmsg_copy_msghdr+0x160/0x160 [ 1299.772208] ? __fget_files+0x26d/0x4c0 [ 1299.772529] ? lock_downgrade+0x6d0/0x6d0 [ 1299.772841] ? lock_downgrade+0x6d0/0x6d0 [ 1299.773181] ? __fget_files+0x296/0x4c0 [ 1299.773484] ? __fget_light+0xea/0x290 [ 1299.773805] __sys_sendmmsg+0x195/0x470 [ 1299.774115] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1299.774462] ? lock_downgrade+0x6d0/0x6d0 [ 1299.774784] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1299.775176] ? wait_for_completion_io+0x270/0x270 [ 1299.775538] ? rcu_read_lock_any_held+0x75/0xa0 [ 1299.775912] ? vfs_write+0x354/0xa70 [ 1299.776193] ? fput_many+0x2f/0x1a0 [ 1299.776489] ? ksys_write+0x1a9/0x260 [ 1299.776772] ? __ia32_sys_read+0xb0/0xb0 [ 1299.777109] __x64_sys_sendmmsg+0x99/0x100 [ 1299.777424] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.777843] do_syscall_64+0x33/0x40 [ 1299.778125] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1299.778536] RIP: 0033:0x7f07513a6b19 [ 1299.778814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1299.780275] RSP: 002b:00007f074e91c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1299.780836] RAX: ffffffffffffffda RBX: 00007f07514b9f60 RCX: 00007f07513a6b19 [ 1299.781356] RDX: 000000000000002f RSI: 0000000020004d00 RDI: 0000000000000006 [ 1299.781873] RBP: 00007f074e91c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1299.782396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1299.782917] R13: 00007ffc581f169f R14: 00007f074e91c300 R15: 0000000000022000 05:03:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 26) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) [ 1299.791362] FAULT_INJECTION: forcing a failure. [ 1299.791362] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.792232] CPU: 1 PID: 11811 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 1299.792780] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1299.793450] Call Trace: [ 1299.793667] dump_stack+0x107/0x167 [ 1299.793973] should_fail.cold+0x5/0xa [ 1299.794298] ? create_object.isra.0+0x3a/0xa20 [ 1299.794674] should_failslab+0x5/0x20 [ 1299.794982] kmem_cache_alloc+0x5b/0x310 [ 1299.795295] create_object.isra.0+0x3a/0xa20 [ 1299.795652] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1299.796045] kmem_cache_alloc+0x159/0x310 [ 1299.796385] copy_fs_struct+0x45/0x340 [ 1299.796701] copy_process+0x3435/0x7800 [ 1299.796999] ? __lock_acquire+0xbb1/0x5b00 [ 1299.797349] ? __cleanup_sighand+0xb0/0xb0 [ 1299.797693] ? lock_acquire+0x197/0x470 [ 1299.797992] ? find_held_lock+0x2c/0x110 [ 1299.798325] kernel_clone+0xe7/0x980 [ 1299.798602] ? lock_downgrade+0x6d0/0x6d0 [ 1299.798936] ? find_held_lock+0x2c/0x110 [ 1299.799262] ? create_io_thread+0xf0/0xf0 [ 1299.799597] ? ksys_write+0x12d/0x260 [ 1299.799890] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1299.800284] __do_sys_fork+0x8a/0xc0 [ 1299.800582] ? kernel_thread+0xf0/0xf0 [ 1299.800903] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1299.801328] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.801709] ? trace_hardirqs_on+0x5b/0x180 [ 1299.802069] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.802445] do_syscall_64+0x33/0x40 [ 1299.802747] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1299.803127] RIP: 0033:0x7f171180fb19 [ 1299.803425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1299.804866] RSP: 002b:00007f170ed64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1299.805426] RAX: ffffffffffffffda RBX: 00007f1711923020 RCX: 00007f171180fb19 [ 1299.805998] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1299.806579] RBP: 00007f170ed641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1299.807145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1299.807712] R13: 00007ffc5897c08f R14: 00007f170ed64300 R15: 0000000000022000 05:03:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(0x0, 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 05:03:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x2) umount2(0x0, 0x4) lseek(0xffffffffffffffff, 0x1000000fa2b, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000940)=ANY=[@ANYRES16], 0x2e8}}, 0x5000) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x401, 0x1a1) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 1299.898243] FAULT_INJECTION: forcing a failure. [ 1299.898243] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.899741] CPU: 0 PID: 11899 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 1299.900614] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1299.901668] Call Trace: [ 1299.902016] dump_stack+0x107/0x167 [ 1299.902502] should_fail.cold+0x5/0xa [ 1299.902997] ? kvmalloc_node+0x119/0x170 [ 1299.903516] should_failslab+0x5/0x20 [ 1299.904010] __kmalloc_node+0x76/0x420 [ 1299.904509] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1299.905134] kvmalloc_node+0x119/0x170 [ 1299.905635] simple_xattr_alloc+0x43/0xa0 [ 1299.906193] simple_xattr_set+0x75/0x610 [ 1299.906719] kernfs_xattr_set+0x50/0x80 [ 1299.907258] selinux_kernfs_init_security+0x26d/0x4c0 [ 1299.907924] ? selinux_file_mprotect+0x610/0x610 [ 1299.908531] ? find_held_lock+0x2c/0x110 [ 1299.909062] ? __kernfs_new_node+0x2ad/0x860 [ 1299.909644] ? rwlock_bug.part.0+0x90/0x90 [ 1299.910219] security_kernfs_init_security+0x4e/0xb0 [ 1299.910879] __kernfs_new_node+0x531/0x860 [ 1299.911423] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1299.912038] ? cpumask_next+0x1f/0x30 [ 1299.912534] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1299.913141] ? pcpu_alloc+0x12a/0x1240 [ 1299.913656] kernfs_new_node+0x18d/0x250 [ 1299.914226] kernfs_create_dir_ns+0x49/0x160 [ 1299.914802] cgroup_mkdir+0x318/0xf50 [ 1299.915302] ? cgroup_destroy_locked+0x710/0x710 [ 1299.915914] kernfs_iop_mkdir+0x14d/0x1e0 [ 1299.916456] vfs_mkdir+0x493/0x700 [ 1299.916924] do_mkdirat+0x150/0x2b0 [ 1299.917401] ? user_path_create+0xf0/0xf0 [ 1299.917941] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1299.918633] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.919304] do_syscall_64+0x33/0x40 [ 1299.919788] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1299.920445] RIP: 0033:0x7f70572c7b19 [ 1299.920926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1299.923285] RSP: 002b:00007f705483d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1299.924265] RAX: ffffffffffffffda RBX: 00007f70573daf60 RCX: 00007f70572c7b19 [ 1299.925178] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000004 [ 1299.926113] RBP: 00007f705483d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1299.927025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1299.927939] R13: 00007ffd152057af R14: 00007f705483d300 R15: 0000000000022000 05:03:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) dup2(0xffffffffffffffff, r2) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getdents(r3, &(0x7f00000002c0)=""/231, 0xe7) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x20d315) [ 1300.066404] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1314.251111] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88804d880750 (size 144): comm "syz-executor.6", pid 11899, jiffies 4295966966 (age 29.083s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 a8 ef 25 66 00 00 00 00 ..........%f.... e8 85 cd 12 00 00 00 00 a8 ef 25 66 00 00 00 00 ..........%f.... backtrace: [<000000007565a092>] __kernfs_iattrs+0xbc/0x470 [<00000000d140b3b0>] kernfs_xattr_set+0x2b/0x80 [<000000007b67de2b>] selinux_kernfs_init_security+0x26d/0x4c0 [<0000000015ab5382>] security_kernfs_init_security+0x4e/0xb0 [<000000009536f360>] __kernfs_new_node+0x531/0x860 [<000000002980d3d6>] kernfs_new_node+0x18d/0x250 [<00000000a6a31142>] kernfs_create_dir_ns+0x49/0x160 [<00000000fb376f97>] cgroup_mkdir+0x318/0xf50 [<000000006c2425f0>] kernfs_iop_mkdir+0x14d/0x1e0 [<00000000695e1b93>] vfs_mkdir+0x493/0x700 [<00000000215e3835>] do_mkdirat+0x150/0x2b0 [<00000000384ee0fa>] do_syscall_64+0x33/0x40 [<000000004ec0b0cd>] entry_SYSCALL_64_after_hwframe+0x67/0xcc BUG: leak checking failed VM DIAGNOSIS: 05:04:05 Registers: info registers vcpu 0 RAX=ffffffff83e6ae20 RBX=0000000000000000 RCX=ffffffff83e52c1c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6b428 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85673e08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e6ae2e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa5d8ed0020 CR3=0000000019c8a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004109f60000000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e6ae20 RBX=0000000000000001 RCX=ffffffff83e52c1c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6b428 RBP=ffffed1001130000 RSP=ffff88800898fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85673e08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e6ae2e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f215e399000 CR3=0000000019c8a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004109f60000000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000