x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="814824d7735e305f0591ade4fde776650000000000000000"]) 17:37:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) [ 1900.991612] EXT4-fs (loop2): Unrecognized mount option "H$s^0_ve" or missing value [ 1901.037491] EXT4-fs (loop2): Unrecognized mount option "H$s^0_ve" or missing value 17:37:40 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(r1, 0x0, 0x100, 0x2) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0xc3, 0x18, @scatter={0x3, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/47, 0x2f}, {&(0x7f0000000080)=""/111, 0x6f}, {&(0x7f0000000100)=""/78, 0x4e}]}, &(0x7f0000000200)="7e56bf860ecc2e2be7bbf015c9b8fe4ebdeba9018e4e48fd74f2e15eef0708a0be92b01e49e8921aaa0124ef7d069b77e1f32fb6b315181013cbe9dff9f6d63ed93461023a54576f70bfaac6b1d6827948247eebedc5465ec455b68217e0fc5257dbaf3a1d27425c393091a46d87255325c15db8120eb86a2d9c6ee4b4e56d2c542837a88ee9a4a99e1da9ffced1433a6f37e6f3ec93cb0e9f12242337e1829d81ae9e5296da53e084f87174cdba7146dadf7694728f0a439962621b6e08d57490a7ec", &(0x7f0000000340)=""/219, 0x9, 0x3, 0xffffffffffffffff, &(0x7f0000000440)}) 17:37:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:37:41 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}], 0x1, 0x0) 17:37:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x1100}}], 0x7ffff000, 0x0) 17:37:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$eventfd(r0, &(0x7f0000000140)=0xfff, 0x8) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r1, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000002340)={0x0, "bba2518dbcb5c1dcc54fd87deb13ba11"}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000003340)={r3, "80a00eead641b6d98efe1379080071e6"}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/rcu_expedited', 0x22902, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) dup3(0xffffffffffffffff, r5, 0x80000) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000008, 0x10010, r4, 0x6) syz_emit_ethernet(0x103, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)={0x0, 0x2, [0x7a7, 0xbe8, 0x0, 0x9a2]}) unshare(0x4a060400) 17:37:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x2000}}], 0x7ffff000, 0x0) 17:37:41 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:37:41 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) syz_open_dev$sg(&(0x7f0000000040), 0x400, 0x482002) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:37:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:37:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x3000}}], 0x7ffff000, 0x0) 17:37:54 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffe3) mount$9p_virtio(&(0x7f0000000200), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300), 0x20, &(0x7f0000000340)=ANY=[@ANYRES64=r0]) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x1, 0x8802) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$evdev(r6, &(0x7f0000000280)=[{{0x0, 0xea60}, 0x4, 0x3ff}, {{0x77359400}, 0x1f, 0x6, 0x2}], 0x30) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f00000001c0)={0x1ff, 0x1, 0xfffffeff, 0x1ec8, 0xfffffffe, 0x99e}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r7, 0x0, 0x100000001) r8 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd75, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r8, 0x0, 0x80000001) 17:37:54 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}}], 0x1, 0x0) 17:37:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:37:54 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:37:54 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(r2, 0x0, 0x100, 0x2) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c000000c46fcc3f910d3e73ed131f4711fd329dd9a8be143e9d74de0884d05003e2a83dc648fbf073ea625b5ce8f2d90f5f3d34c88cbc7eaab72a47a94ee9fdc499776696cc62e3f0ce563436c99f174d89ddf310ddf53fb78d6997e8786b4835401c445af72484b24ebd505c489168fde1e1a9713f98a5eb8e", @ANYRES16=r5, @ANYBLOB="010027bd7000fbdbdf251100000008000600ffffff7f"], 0x1c}}, 0x40040) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="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"], 0x30}, 0x1, 0x0, 0x0, 0x48001}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(r6, 0x0, 0x100, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0x40086607, &(0x7f00000004c0)) r7 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r7, 0x0) r8 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r8, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r6, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYRES32=r5, @ANYRES32, @ANYRESOCT, @ANYBLOB="e4fbdeccf6b78d8255622d9a869bd61aeb21ab7b2b32acc20c37ea257f3887174cbcb3a5f778808322fee8904bf3744cd65c4cb62ba42f3bcc71c2494f7adbc81039725873fa48dc56da2d6a4a77efe76303bd02e580ffdc86d60c3a71bd0ac20d79d9deced4f89a6001dec823f7b75bb6cbfa33d2566a8cb04584082f7cecb083a9d1580148cb30d845cfc51275debc8111022388da68ccb2fa3457", @ANYRES32=r8], 0x1c}}, 0x4) 17:37:54 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) keyctl$search(0xa, r3, &(0x7f0000000280)='big_key\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0) r4 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$KEYCTL_MOVE(0x1e, r5, r4, r6, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r4}) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10002, 0x0, @perf_config_ext={0x2}, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r7, 0x127f, &(0x7f00000003c0)={0xe00, 0x0, 0x0, 0x0, @buffer={0x300, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1915.074602] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.075868] print_req_error: 335 callbacks suppressed [ 1915.075890] blk_update_request: I/O error, dev sr0, sector 7 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1915.083547] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.084735] blk_update_request: I/O error, dev sr0, sector 263 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1915.093455] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.094493] blk_update_request: I/O error, dev sr0, sector 519 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1915.098918] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.099437] blk_update_request: I/O error, dev sr0, sector 775 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1915.100491] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.101002] blk_update_request: I/O error, dev sr0, sector 1031 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1915.104908] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.105396] blk_update_request: I/O error, dev sr0, sector 1287 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1915.106531] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.107046] blk_update_request: I/O error, dev sr0, sector 1543 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1915.118392] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.119026] blk_update_request: I/O error, dev sr0, sector 1799 op 0x1:(WRITE) flags 0x0 phys_seg 32 prio class 0 [ 1915.137970] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.138470] blk_update_request: I/O error, dev sr0, sector 2055 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1915.139882] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.140366] blk_update_request: I/O error, dev sr0, sector 2311 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 17:37:55 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}], 0x1, 0x0) [ 1915.172648] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.175686] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.176273] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.182198] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.182849] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 17:37:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x3100}}], 0x7ffff000, 0x0) [ 1915.191375] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.195883] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.196449] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.197182] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.206040] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.206588] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.207425] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.208126] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.219907] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.220466] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.221074] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.221613] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.229884] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.230446] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.231367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.232002] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 17:37:55 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 1915.245897] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.246459] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.247062] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.247589] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.252407] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.261367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.262084] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.262621] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.269877] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.274037] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.276818] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 17:37:55 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x41, 0x40, 0x1, "612f8926389103cd8ba8ad59cf466649be4dd2b7f74a00bba722879277f597659d1348fd83081b6b455c0401267a1e7fd05ce68b03d57747b160b02ae296f4b205"}) [ 1915.287657] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.291196] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.298164] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.298704] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.299311] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 17:37:55 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}}], 0x1, 0x0) [ 1915.310989] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.311569] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.312300] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.323210] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.323730] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.324611] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.331032] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.331542] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.336640] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.337212] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 17:37:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x4000}}], 0x7ffff000, 0x0) [ 1915.342377] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.343007] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.349121] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.349635] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.357391] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.357955] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.362939] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.369387] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.370179] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.377129] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.377664] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 17:37:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) [ 1915.386979] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.387604] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.388180] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.393232] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.393882] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.400395] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.403678] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.404297] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.416174] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.416700] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.417261] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.427930] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.428509] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.429295] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.437622] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.438516] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 17:37:55 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}}], 0x1, 0x0) [ 1915.446901] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.447445] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.448048] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.454920] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.458923] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.459449] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.465998] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.466532] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.467261] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.473891] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.474418] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.478875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.479421] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.482027] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.487202] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.487760] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.489906] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.490439] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.491065] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.494058] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.494588] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.497024] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.499863] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.500382] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.502781] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.503854] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.504368] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.505255] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.505903] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.512156] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.512679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.516013] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.516530] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.519292] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.519917] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.522920] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.524446] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.527062] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.527584] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.531044] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.531574] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.534408] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.535021] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.538025] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.538565] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.541674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.545875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.546428] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.547305] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.549190] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.549701] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.554321] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.556445] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.557519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.558515] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.562154] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.562672] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.566920] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.567433] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.575927] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.578164] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.580320] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.581492] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.582583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.584426] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.585096] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.585619] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.588803] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.591265] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.592201] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.592803] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.594498] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.595587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.596197] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.596727] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.598456] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.599524] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.600198] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.601869] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.602394] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.604268] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.605045] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.605577] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.606912] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.607491] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.608224] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.609875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.610393] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.611860] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.612433] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.612968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.614997] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.615520] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.616896] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.618578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.619120] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.621602] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.623338] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.623868] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.624504] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.625045] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.626705] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.627245] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.627874] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.628391] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.630026] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.630564] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.632111] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.632701] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.633283] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.634957] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.639267] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.639809] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.641911] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.642426] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.645357] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.645911] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.647584] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.648656] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.649443] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.650073] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.650585] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.651192] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.651961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.652530] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.653193] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.653715] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.655435] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.656505] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.657048] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.657570] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.659344] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.659911] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.660498] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.661034] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.661605] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.662171] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.663051] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.663561] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.664265] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.664849] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.665452] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.666130] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.666709] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.667283] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.667932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.668430] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.669084] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.669604] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.670202] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.670728] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.671342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.671926] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.672517] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.673107] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.673929] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.674501] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.675165] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.675679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.676298] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.676832] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.677406] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.677932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.678570] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.679141] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.679713] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.680289] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.680881] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.681433] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.682172] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.682675] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.683342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.683904] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.684414] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.684995] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.685503] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.686080] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.686587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.687129] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.687727] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.688327] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.688913] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.689433] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.690106] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.690618] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.691190] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.691684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.692310] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.692887] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.693398] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.693966] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.694483] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.695100] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.695608] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.696148] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.696834] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.697355] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.697938] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.698458] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.699086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.699595] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.700172] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.700670] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.701310] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.701898] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.702424] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.703024] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.703530] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.704103] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.704624] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.705209] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.705817] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.706374] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.706976] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.707485] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.708018] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.708519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.709091] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.709592] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.710268] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.710814] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.711350] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.711960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.712484] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.713068] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.713577] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.714186] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.714780] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.715344] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.716224] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.717537] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.718130] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.718637] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.719251] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.719781] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.720386] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.721208] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.721727] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.722310] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.722917] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.723426] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.724008] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.724508] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.725160] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.725675] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.726273] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.726853] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.727400] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.728007] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.728512] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.729042] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.729643] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.730241] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.730784] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.731326] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.731943] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.732451] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.733025] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.733533] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.734206] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.734729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.735300] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.735890] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.736405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.736986] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.737497] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.738103] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.738698] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.739286] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.739869] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.740385] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.740966] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.741481] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.742158] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.742659] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.743288] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.743898] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.744405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.744992] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.745515] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.746171] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.746674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.747227] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.747875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.748398] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.748929] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.749434] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.750018] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.750527] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.751137] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.751636] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.752260] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.752861] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.753375] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.753961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.754488] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.755091] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.755598] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.756145] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1915.756676] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 17:38:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000300)=[{&(0x7f00000001c0)="0f64c43ba33f95ed983dfb48", 0xc, 0x4}, {&(0x7f0000000200)="80c6f1ffff3dfd9f760e774b19ba28f65843b0b3c82c21c2042588900b9eb3849acd7fdd2602fa00e9ed44b5913dc471f3ee9a5c5963637de3d8d8bb7fde77e600f1570fe34c132798f7ae3caf6cb876877426cba2b742522913dce0cabe5f756af3ba9c3a2e5219c2cf94e638f2e1079c40eae3a966f596420ef6ae3d1a4fb3f82e371f96d1e1711460c1b53ee0cbb3fadfcbd87bea76ecd51c49aa81b8c405e388992f18351040fe95ee5afddfda14d322056bc2bed6e7fcb1c989939f20a59a73a0c39277307b632a80253cf4ed10a5b597fc7f2f12bbb0a3118f", 0xdc, 0x7fffffff}], 0x1d000a, &(0x7f0000000340)={[{}, {'vfat\x00'}, {'vfat\x00'}, {'vfat\x00'}, {')--@./}'}, {'vfat\x00'}], [{@euid_gt={'euid>', 0xee01}}, {@context={'context', 0x3d, 'user_u'}}]}) chdir(&(0x7f0000000040)='./file0\x00') stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)) 17:38:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x6000}}], 0x7ffff000, 0x0) 17:38:10 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:38:10 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000140)={&(0x7f00000001c0)=""/76, 0x4c}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)={0x9d, 0x7, 0x3, "5aa0281ef9949b7048d183b3b68d0baefc07a80678378eae50ca8a54e376ee6b5f574607b6f0e1bd826e00bcdada2a8f5454789cc605a85dae7ae6797ff281705cee953875c821a667b34c812da7fffe3936c415ce6a8373e48bac6d518f2e92af41c5f7cd554dd147b6c5b6073594732e39638b6299b931e9613df4b656cbb145c74b109836fc0fc81913f1e06f84d271521fa8222478a7b87d9e5874"}) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0xff, @private2, 0x100}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(r1, 0x0, 0x100, 0x2) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000000)=0x13) ioctl$VT_WAITACTIVE(r4, 0x5607) sendfile(r2, r3, 0x0, 0x100000001) ioctl$CDROM_MEDIA_CHANGED(r3, 0x5325, 0x8) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x2010, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) syz_io_uring_submit(r5, 0x0, &(0x7f00000002c0)=@IORING_OP_STATX={0x15, 0xb, 0x0, r6, &(0x7f0000000340), &(0x7f0000000280)='./file1\x00', 0x2, 0x4000, 0x1}, 0x2) 17:38:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e5", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:38:10 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x1, 0x0) 17:38:10 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:38:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff88800d20d2f8, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:38:10 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}], 0x1, 0x0) 17:38:10 executing program 2: arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="08002cbd7000fcdbdf2530000000050034000700000008000200", @ANYRES32=r2, @ANYBLOB="050035000000000008000200", @ANYRES32=r2, @ANYBLOB="050035004ba1090000003600000009000000"], 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x8010) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001090c0004000480080001200000000008"], 0x3c}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f512, &(0x7f0000000080)) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000036136c58902b90350008000300", @ANYRES32=r5], 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000228bd7000fddbdf250b0000000c009900040000005300000009000a00c41c821477000000"], 0x2c}, 0x1, 0x0, 0x0, 0x48001}, 0xc4) fallocate(r3, 0x0, 0x0, 0x8800000) 17:38:10 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x40, 0x1f, 0x8, 0x0, 0x8, 0x160, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x81, 0x0, @perf_config_ext={0x68, 0x50e8}, 0x2900, 0xffffffffffffff81, 0x3, 0x1, 0x4, 0x7, 0x1, 0x0, 0x3, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) [ 1931.082465] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 17:38:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xdc05}}], 0x7ffff000, 0x0) 17:38:11 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x16, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002880)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0xaf9, 0x0, 0x0, 0x0, 0x3}}, [@mark={0xc, 0x15, {0x0, 0x7}}]}, 0xc4}}, 0x0) fcntl$notify(r1, 0x402, 0x80000000) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x400900, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) sendmsg$nl_netfilter(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0xf, 0xa, 0x101, 0x70bd29, 0x25dfdbfe, {0x3, 0x0, 0xa}, [@nested={0x22, 0x34, 0x0, 0x1, [@typed={0x8, 0x1a, 0x0, 0x0, @uid=r3}, @generic="d0cdff40084dbcd1823228651f4d", @typed={0x8, 0x3d, 0x0, 0x0, @uid=0xee01}]}, @typed={0x8, 0x79, 0x0, 0x0, @u32=0x22}, @typed={0x14, 0x38, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040}, 0x80) 17:38:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}}], 0x1, 0x0) 17:38:11 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:38:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) signalfd4(r1, &(0x7f0000000040)={[0x3f]}, 0x8, 0x80000) 17:38:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xda}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 17:38:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e5", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:38:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xe803}}], 0x7ffff000, 0x0) 17:38:11 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x16, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002880)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0xaf9, 0x0, 0x0, 0x0, 0x3}}, [@mark={0xc, 0x15, {0x0, 0x7}}]}, 0xc4}}, 0x0) fcntl$notify(r1, 0x402, 0x80000000) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x400900, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) sendmsg$nl_netfilter(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0xf, 0xa, 0x101, 0x70bd29, 0x25dfdbfe, {0x3, 0x0, 0xa}, [@nested={0x22, 0x34, 0x0, 0x1, [@typed={0x8, 0x1a, 0x0, 0x0, @uid=r3}, @generic="d0cdff40084dbcd1823228651f4d", @typed={0x8, 0x3d, 0x0, 0x0, @uid=0xee01}]}, @typed={0x8, 0x79, 0x0, 0x0, @u32=0x22}, @typed={0x14, 0x38, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040}, 0x80) 17:38:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}}], 0x1, 0x0) 17:38:30 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xf401}}], 0x7ffff000, 0x0) 17:38:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff88801ce764c8, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:38:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e5", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:38:30 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xf9, 0x80, 0x6, 0x0, 0x2, 0x3e, 0xffff, 0xc5, 0x40, 0x12f, 0x101, 0x5, 0x38, 0x2, 0x800, 0x6, 0x89}, [{0x7, 0x401, 0x9, 0x401, 0x2, 0x7fffffff, 0x2, 0x8}, {0x60000000, 0x5, 0x0, 0x2, 0x0, 0x71de, 0x35fc943d, 0x9}], "89ddad8cb7f24e9f9bd5c52db7e95434fb2c429ea5b232e0ace666b5d9c964ae235dad55bdc8aba9f5d2e411176209c4dc161232d21abee74a6cadcdc30c76df81289729d1ba8f16e96ac35236abc7ea9796760e8a74f81a9cfb89c3757f3efa93702e302a64803e6b22ea98aa20ac4b85c30b155c668d6cd2c7ad8f193ad60198ff3c", ['\x00', '\x00']}, 0x333) readv(r0, &(0x7f0000000140), 0x10000000000001b7) 17:38:30 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:38:30 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x15, &(0x7f0000000080), 0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x480100, 0x148) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) fcntl$dupfd(r0, 0x406, r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="2800000010000100000000009efa569e43ebf856d29c871700d5788cdf387bea6fbca7cdc20007e5cf8df6000005000000000000000c00008008000d00ac95e9007c1a8ca3aee5ff0219acb87ab2876e1deaa910ffc384d10f5d60bd19ad512c5dd4c53f449d0f387a40f7e18eeb6b0a6c183495cf1b85f35c5fce1061ca7f43bd87b96c87b0b233611517bd2d346017ba2e66603bd7770214b783ffcf85c6611a9fa974efa4e7bcb60f86c41559"], 0x28}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100), r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x1c, 0x0, 0x621, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_NOACK_MAP={0x6}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000400000000040000006300000008000300", @ANYRES32=r8, @ANYBLOB="f6bfc5322ad84f531019d5362c2aa80b178bcd216910aef482ac52825e26ec8dce5f493883e298a409a74898d1e0100ef5d82253cf41cc70ea23326983ef3bd501d4f5851e33ff093ea2698b54c4d991ad1311155f8eec41869066d26414145bb6a1db8e71b89b285d67dd"], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000001c0)=ANY=[@ANYBLOB="01001d000100000018000000912dfa7f37c6fd7b59efab289321ca460ef955", @ANYRES32=r0, @ANYBLOB="01000000000000002e2f66696c653000"]) 17:38:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r2, 0x107, 0xa, 0x0, 0x0) readahead(r2, 0x9, 0x6) chown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x8000) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r4, 0x0) fadvise64(r4, 0x4, 0x90, 0x3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r5, 0xf504, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) 17:38:30 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = getpid() ioprio_get$pid(0x1, r1) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x1, 0x3, 0x8000000000000000, 0x34a, r1}) 17:38:30 executing program 2: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18}, '\x00'}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x81, 0x1f, 0x3f, 0x4, 0x0, 0xffff, 0x1, 0xe, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f0000000180), 0xf}, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8000, 0x8000, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xe, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000000)={0x0, @aes256, 0x0, @desc4}) unshare(0x42000000) 17:38:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}}], 0x1, 0x0) 17:38:30 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xff03}}], 0x7ffff000, 0x0) 17:38:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r3 = creat(0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r4, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:38:30 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:38:30 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:38:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x5}) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x911802, 0x140) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r2 = openat$hpet(0xffffffffffffff9c, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) r7 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) mq_timedsend(r7, 0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000002e00)={0x0, r4, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, r3}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r3}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) mq_timedsend(r7, &(0x7f0000001e00)="3cd52ed97c9e213909d730166b17123f3294a3353d43c2bda33f8b46124feb3e574cb78ff55dae93c1d80f8b1b571caa5d0f953fdc20af7c2907f40c853111e5a4a6405dfd6510e2573f0cd5a14f722a746315bf5955d6443a167b62e37e70e67059a451add17b0ba3a4967e37a184c25fd56c25f32d2c08713830771e190d3e72e360fbae6eb7f69da7ae1b7575584eb3aad405c2e0cecf7c57c725e35199b38412b21fb229249cb5214590ea9c200b689ed99433fbbb389404f04d726fe19ef657f8896380c769f15ede2ebc816773d5730db7acb1828fbcdffc4da713e0944bca7028c47238c1aace7879fca945a836e4ff365b155de4a6b5e69df15c57c8c84a27359b026401b2d2ebb22fc4727115b803cbed672e1c10421e53aecb9848432f39231a6fe45af05a49d7f66593d188b01763da10fbe076c0103b005492008157072857ecefae4dfd561229bd8ecf19e938d25a4315e343c5ffc67c1810af17fff3e930e390dc021b8a020e9ad5750cbdb6ac2406d580f35c6776feba23704f457eb3c9e481a38ae02519b5561493b3a5a22682f0622f55b91bf3fe3b6eeb0b411767b39cf41b6ea7f7606bbbf59f038ed99313e9185bafa0f1fb0d7f8f854025afe6eb498d49d00f869ed3d4abccfb90d70f1dd88a92a1f6c2a1f62238ff8733e3b25225fe919598664429606c6ba859544fe0de3a9f18ed8fdd5e9ce15ab80c870a454b550e5fe805396bf4ed72b627314fad05b74a500135c9bb1b297b170356d42c9983c3275dc8c95a5a198f3b896c712d4c44d66ee10f29d4d71df5484c473cdcd107d66ded8e5219a066b00f45faca7ccbde009031f583819cffcba547c3b5707c7c1eba73dc6ade8f584244ba35302df2a0341c8e629d52fad82cc1c34dac09d39a975902e883ce1b648080e5855ad37961abaa7eecab4ac63cb839f4039f8b93d2ba6e618ebc437166e24e210171bc8ae12f31e90adadfdba265f9a8df86648ff4bcff451f289c9142ef5bac4ba3131852ff820087a5b7e1131eb05c8c857dd4cf2839501138174f70eca95c39a59220f47be95cbe4996c214f17e5a790679057bf0c05e7d79797fa74af891a0bb050183e9124f3677a94c92e3caaeb095d0746fa8a82e30f14b228fffee24ba0385ae2940a223aa6fdd3bee655aabb131e4660eefa4e65a0cd2197f54d94783a2513ab6ae8c548b7fae70692ffa367a95cde0cd90d37be42547f30d1583a913b11c9f998d60d8c78a3677d79c717dde50a0124d918e66655902e6cb60ddd82727bc05b31057693ee9d7601be6d8870edc47c328afa800911568d99655a271c65de3a07616806e280bd453217ee2420b32544c67e34bbcec1874b450af23af54048d3a10e71967bc1ee3c0029235d95f158895bbdddfa81a3cfbcc74c7c352820f75e00324e154441074853b7c2dc1c3ed42873c6323e0bd29058b62187f57ee8def92612a91b1598af90904e770a8788c05934b54f998ed0a4b54198e74a1bdcd6e5a07109f6bd0271384211633d2d70c28843fbed80968d3cf49a697bfaffb92101e0626dc34c4b9a8b47438606152c9eea6481597918ef7739be21f562c86289b842b1d9208459f41716f2518da7d3f4ba062c0ea28a221e44f071325deef0c9ce5e8bb729e8f393020db13ad241503f9c4dc21fee5bc58893e112a2bd2528aa825c3b8e19d8312b268a43c9c662737da60bf318a5cd9069a2d96653818733825f5808371ad593f124ce11272705b5dd827d269ea01ea8a3948418278ba34338fea40665bcb5365033785adbbc7f20ea2489a728670108781da688a9d2f327f7723b76e4d2dba9c05a8f15bc05fdd521ce44e606fb0daf61c3cf96094bc4c8ca55892cd55803da5ec5f72c9ea01273ba23d834061b1a4e7778470cb726d78692d1d00291b9753fe96e43b24f239b575978b0fc6855aae3e384fff6dca011d58ca718f5a64ce083744057fadce07c1569c0a2dd34cc2f990c2d0705d4ad2dd03ed74e005e495987f5dd3b561bfd610d372abd48da2cdaa6253b074b55a30c7663daf7268768a656ac8f36d0c61a6671f6b75b69634c5c3cb06bf7d28e5b01743d673ed200a51e70f7d72c908e21769144a72870fead7075c25ddadbfeb9a9818638c3829d329eac2eb542f190986977bf6b79ae967ede1bc3e998d271f8225d5ae195e1be0ae7be5dba2584bcda86187ccde07022a3a462f505557140b14646b8d2ccb67c82bcfbeb71ece2f3af3d2d522613571766fbc39716026361c6d109d1ca6616495a5c1186cb2009e8d365abaf16a81230ad8c05889f9fcbb7ce0c6a507f9b5a078dfe5a7483d376f16428d23eb15c688f252d8548b5d94f34f8cd430b1a31bcc3e1ce90d14e3e7a33021df06882d32b90e4c6968c8046a7410bb6920f278d1b1c166875217c8e8d417adf9b50c85c509fa0581d906ab12c339e7ce03a49693489e7965043c75e5950363f062e43933d848ac73cb5f8585eee7d22305f9332df9ad7a11377c01f15ae3009d92dc3fae370f8f817400fd7f5aeb5b103fa1ba707b86ebff9324e2d52a8d46baff356e4be977bab515127107916440e1867c4d6279b08479597b3268c98566723c935f96b569b2b60807f8a046ea6e2761c062c7913dc9d4bf71f60ee2fd0e7bb3e5b718e8d4a62c43f2d53d9ecdbfb6d1dea8d8ce51c574c5007a55bd1a5933e3895659255153d501e3419ecb2c63cf337b7de31b0830f7c5b4fe267ef576c7776d34e47c7ee204609284af5a10a88b0d2488574d50614b004c04285cadc63001ac023f570b6fa4c0a21635b2d53405c4279ce02ad7033cc5df8559e1cafb3e6b0dd169df0a980a27d5acd32f68e166ddd6c43e186de12bd09f14e644c5f7a696b1cec0cfc757dc64e8f0b64c8bab66db414fa724c175fa49676d0ae100537b7cb55751a54149b60653a20bbbdaa58a9172228e553a5ec93387db79eaa9cd542cf8035d4c50b7e09e3728f153641e7fd5c9cb8969df5374a25d3611aacc81ea1d195a4b2f7e1f861259fe1d2d6422e32acd44d2f996508c07e54b200a472e4782b0e5aa030898f4c51b578f60d17fc5c01055be225120118c20b171d8bffe38f194b0ef598ac5696825da3442eb0513e31dcf997a213ffb711392223c906b637c77a5ac612611b9d4f949bfa43d746b38fa61a2b736f116edfeda864cf56357f0d9ed25d27cb057c8227379a86d9f2bf00f289ea8fcf4a61f0bbc50045047e7ef0b097e4c65d749f4d40a89f6ff2e17990e837f81364faaf32cd0c5cdf9846173610759a22a424e00f57a3143c8cf561f12489ff01fa64ef27c39370e1eca076ecaa6fbd701ad2a29b80cca60bdccd34e5f26fd0ac661ef5da02883d55401b05b15770399f960c8749fdc90fc06ddc18bd88ad6d21a7db3aaf52e28ab741f211898192d4ab34b659e79eddd844a28b5c3d0125f5b8781f270f7832114c744bc5820a60b28d408291884c0f85b47e660f8545c412c235e85da5e33bd315067b9f89a36b76e204e82ee465031f0fc463d42254f73fe269bd7ba4f4f06dafe7057f58f5387f40b0bf3fa2e9ca6b2afc496d26ebd092e0373750cc649f16e1e35179825f3a51d8b015539a4ba1661addc540c776257ceadb0d795f8fd6737bc302fc39b4dda8bf0db0f4d0a62839b02ff488810413131a566082d864e5bfc3e073a63f17b28aa8929cd239f50689fef85a8de3308be69b82d7eca3d9e5190586362841d1ff6c562a3c6d74e57750e80baddf2aabd9cc40ff3aa30e2a9be9150815977e3292f171cd184074d00e90251ffb0943b276e67a87d7eed7af3d886519f54aec72d5eb01268202999e8d78532461a8524aa0fea7c49aa864f956bc4dd31047a529f8bbf4ba971ded87c6121533491863d6d2f4dbeac566839675a781f43c9ed27d0527c961a60f212deafd75ac331674b4e76d9151c9813aca07565b1e8b52a835d1693f36cdb9be6fa8cdd7431183467be6dc75c867268cbc7f7a6cd1059ccb123c47de06785d1deb8a2a4ab286929253e05107d07c80d2790af78fe59f022763514ade2fd2f2aa0fff6c99c6af7498c9024259f2f49d8e0f054b9e7d774b4e7b1552340012153d4c79451be6ffc71079da12c140d97f3a813256e93e22e3ff9045fc6075df39fab13ed8661a6a06bc083194ebe6bc40040840f08cd586d7a3a36fe7015d3a636f94553955325eeb3d5c538251202c6c1521cbe2b87e3a22ffd2744094a44be4a63e09271a29fbddc042872a53dfe54670d0028d640754c2aa06ab7e299244bcf5517eca5a0d50799ff872bdafe888a587633f3771c161c520e56764ae13e351dd4a4fbbc4c12e00986c58a3af279473acfa42cdd442d2ab36a1f2c8e15df74b9b9fdb7f4ed0a527e1b2522ea18b822d420e493a114031ef87dad32101c7002f7aacd435e3c952c5edf7f6317215709f673926e15feb3021c3d31adaf27f468ed93f65201963ce3ec173f8003d417961a503bfe5181ed3397bfe1299107235aa1562baf276ddc6b3e802a35042d0f8a79ee06102c8e9b0a92e7e92da2788c8e6450a924fe8d7637a183f9a0b69e949ee3d54bd5abf9b6a90bd3cb8a9bc9d8d91418c72b3fe665d54dec99eb53fcf474a0f42171e2f3fb16a00633408f77c205a168f70379d5f10988510ed2605f1811c5c22d9e3e44f483cfc65e373e431eb224414db926be369c40fd1e40f2938cc484b33f69d8ee518c33a91284d6e3635720b731c68011d6b467219a6deb3b6c47ae211375d738b6f77a4f6ea2b80579aa34b3d0bced65466b6946f386482db484af971f33f546f2c0b0bcf6135784fcf3f0f1006fe34617e86adbabf80935995d34b48b9d1f12ef089510dbbd616a59e875d3f3e0aa7aea1758d6c5f2a699d031823205a4ad815efee17395d817015c392a79e4d0ac9686e596220b0ecdd2c1646e54a5630cd6022b1f52d81de0b7c0e772ab6a9c931bf527b0a874f79fa860cc82283d36be2114a4ce514b60f2b1ef941fb4e1a8d2899467d6231f82fefa3bc2462677ffd1d2436b44bf4f7fe734064f0a0b16c3f16332a85895ff84494009e00440ff7940096065996741278b3652d6286545b10c77ab2e905c1bb8c2d538ca6521df0707f55e0054d2d87d060f863c9cc50db915ac404ff6017a48a04190d12168a647d803819879c0bc3e688663d1585493dc800727fb4775473005d0cc37c3941dddb31071cb5389083a0ee8aa5317326c7f8a29646e24bb32c6d6198d2e095a6694f5ad98e3940608d60e169cc7dc507564e043aebdde61d7adf96f0a52adbde8f9ce5f99a323c8cfbb35c23baef865a6a6f949b9ee425ed2dbf1f74eda38aea9bb1e814f8de792d106ffc2030223aed765a49a8c5225f986508d023b698226c40e366e93264fbf51c2fa8a889f13ef4b768c480ae4ef3d5f061d7cd2ea2456e0c2bca80c3e7b23209a4d221a1df8cc6b3e5fa6dead523253952380abf2ca49d628a4078e4c34c49caa2f84dbd9325c2459dcf8ffe65163a438dc1f204cfeca634cfd0a2f0f165539b88bbff3b4136f21cd050ea0c2959701aed2f44be88498bd6ccad2935aa459f91e146928eceef45a9dee8ac5d9ecedf6f3757a3058742aa743b74020dfbd925deacc4fc4c1e1d91653f93b190229888c5103c29a4b5ffc836babd2035e79d5742e32f663fa44ad2ccb40e547037ecfc1d8f1cf1f70638302c6b8e8524ffe1e1b33464ae0c4ad2b8f53350998a864ac84789fd0f48534295285e6", 0x1000, 0x5, &(0x7f0000000000)={0x0, 0x3938700}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000140)={0x0, [{}, {}, {}, {}, {}, {}, {}, {r24}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {0x0, r6}, {0x0, r20}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r25}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r22}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {0x0, r23}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {0x0, r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r21}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}], 0x7f, "9656c75f04ba4d"}) lseek(r1, 0x0, 0x2) r26 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat(r2, 0x0, 0x480c1, 0x186) copy_file_range(r26, 0x0, r1, 0x0, 0x200f5ef, 0x0) 17:38:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}}], 0x1, 0x0) 17:38:46 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}}], 0x1, 0x0) 17:38:46 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x34000}}], 0x7ffff000, 0x0) 17:38:46 executing program 2: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18}, '\x00'}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x81, 0x1f, 0x3f, 0x4, 0x0, 0xffff, 0x1, 0xe, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f0000000180), 0xf}, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8000, 0x8000, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xe, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000000)={0x0, @aes256, 0x0, @desc4}) unshare(0x42000000) 17:38:46 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:38:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r3 = creat(0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r4, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:38:46 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:38:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:38:46 executing program 3: syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x4, &(0x7f0000000200)=0x7a52b9a7, &(0x7f0000000240)=0x8) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:38:46 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000040)) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) r3 = accept4$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x80800) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0xfffffffffffffffe) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r4, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r5, 0x0) readv(r5, &(0x7f0000000240)=[{&(0x7f0000000300)=""/194, 0xc2}, {&(0x7f0000000180)=""/170, 0xaa}], 0x2) 17:38:46 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x1, 0x0) 17:38:46 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x40000}}], 0x7ffff000, 0x0) 17:39:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="0a00000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:00 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(r1, 0x0, 0x100, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000500)={0x53, 0xffffffffffffffff, 0x20, 0x5, @scatter={0x5, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)=""/24, 0x18}, {&(0x7f0000000080)=""/121, 0x79}, {&(0x7f0000000100)=""/117, 0x75}, {&(0x7f00000001c0)=""/73, 0x49}, {&(0x7f0000000240)=""/166, 0xa6}]}, &(0x7f00000003c0)="495be72bdb6f8b07db910bec172081ad44ea2fdce4130bde4651498e1a097bcc", &(0x7f0000000400)=""/136, 0x6, 0x10, 0x3, &(0x7f00000004c0)}) 17:39:00 executing program 2: r0 = syz_io_uring_setup(0x3ac4, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd, 0xffffffffffffffff}, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) close(0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffeff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) lseek(r3, 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r6, 0x0, r6) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000300)='`', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000001740)=',', 0x1}], 0x1, &(0x7f0000000280)=ANY=[], 0x10}}, {{&(0x7f0000000280)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000340)="faa863f25b9f2cc0eede699c99eb83c08e576d894a2836fb9ff42e989e2fab62f0c280d53dab1b95f2a5bcf03a931e5150b5fd148b612829b3a0d173e1bf70814f9ff58f1bbd26da2fb0031d801cb404f0498c49170f2cb42ac3c070cc5458996a0dc7773a5b6bdf2097004e38a2b42298", 0x71}, {&(0x7f00000005c0)="81b20ba221e7f78fb267d1fd29f100bb57cf888bd93ed58d450620ad84d32ae1cbb73351ec603c0df0cabf05c388b8d4079f7bf18d028cec93a494037d7a3f30162f278ea826ac45232a1a29a25760e2fc0f3516171c2c8157", 0x59}, {&(0x7f0000000640)="96e903e733280f4dd02a54519a9e32819f43acf68182f46e866d9f28d0e2abdee494d4bad7e17707c76ca3447667776c3c4bff5d8719051ca375bc233e67f4119cf4280f451c1a84fd6d927415861df7574a0ca941", 0x55}, {&(0x7f00000003c0)}, {&(0x7f00000006c0)="b78aa3924aba5ade303373301d362f8193ad8dd3e9f0a3a2e98b0a427b79728c11b461bd770957400a728c85b9ea276e7b39b790494c4344d61235f9813833ddf36195a80031dfb49ab999eaf120904243d762483891f31cf6bb2dc7a1f518f5112a73b701bb83fdcd019954af1df45816acc31fe1c4dd84cab263270e62034dc4f366ffd6611b25d15f42063ffbee33b980acd27d9dc4a0967b742afe5483f2fce8a4e61ec102f624c9a1d4d45761f34d5352f4d7eef1480ed2bef6964274265ce00af8962fb2f111901b222c0ab5b6d420ca6c61c03d86f17691c52bacbf7e26e084b684b4e150d3b8ab9f006fef7f36ee8fbf52bd90", 0xf7}, {&(0x7f00000007c0)="970fef7d2946aed37b5944897c6892ce39c20d3f7c2b91e8763d14afc1f3320a9c1839476e57dc5128219f034397de50bce26b8d7f8b2d1a23d2b71f6d4a9caa9e4d749754c40767bd781fa1bacc8ffe4931997666cc7b220df799c2b1b5f146d42fdd97dc807cd6f6b398ee8f07a757e4577b42c78bd6d09bf407a1b013188b2774835f2111d93260c810", 0x8b}, {&(0x7f0000000880)="9bdadf1851d2227419194cff6ae32993602ccb2127d7fc3d6c5c35ce6b01a91e214887164be6", 0x26}], 0x7}}, {{&(0x7f0000000940)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000c80), 0x0, &(0x7f00000009c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r0, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r4, r3]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0xd0, 0x1}}, {{&(0x7f0000001400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001480)="e3d89afc68df494fae9b87accadf1fc0929ca0024c496c41a1935ecd95d57f18764e40e77d99cfa4e88280f3961e627be45f6c47c80f0c07af725ac33ed72fe5538717efcf2f8d173ec8362deac64c0adc7458f1d712b3a6087d391ec823f13147f5ae14d1f175e672b91508bae666dfc9d391fa1ec35f8382c4653dd05687e64db01051b29fd07616510b849736d21a97ffd99122e267bec4af746a5e231b41942494", 0xa3}, {&(0x7f0000001540)="759cf2e6da8f48012088068101aa658dbfacebc3db45aef968b082121d03c50c35feb16dfd488ffb5cc26a7d38e0361a6895f7749125473e470c9246ebaa506452b4c29f7aa95c47067839564e53192b0cf3f6c39228b4b8a9438c9b710edd862264", 0x62}], 0x2, 0x0, 0x0, 0x4004014}}], 0x5, 0x0) syz_io_uring_setup(0x313a, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000440), &(0x7f0000000400)) eventfd(0xfbb) sendmsg$TIPC_NL_KEY_SET(r6, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000029bd7000fddbdf251700000014000780080002000000fcff08000100080000007c00028008000200ffffffff04000400080002004adc0000040004000400040008000100d01900005400038008000200d635000008000100ed82000008000200ffffff7f080001000900000008000200ff0f000008000200210000000800010002000000080002008000000008000100400000000800020000000000"], 0xa4}}, 0x80) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) 17:39:00 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:39:00 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, 0x0, 0x20000040) pipe(&(0x7f0000004640)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)={0x1c, 0x10, 0x0, 0x0, 0x0, 0x0, {}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000046c0)={'wlan0\x00'}) sync() openat$binderfs(0xffffffffffffff9c, &(0x7f0000005dc0)='./binderfs/binder1\x00', 0x0, 0x0) 17:39:00 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x200000}}], 0x7ffff000, 0x0) 17:39:00 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}}], 0x1, 0x0) 17:39:00 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r3 = creat(0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r4, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:39:00 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}}], 0x1, 0x0) 17:39:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x400300}}], 0x7ffff000, 0x0) 17:39:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="1300000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}}], 0x1, 0x0) 17:39:01 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:39:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x1000000}}], 0x7ffff000, 0x0) 17:39:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="1800000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:39:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r3 = creat(0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r4, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:39:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3800000000000000}}], 0x1, 0x0) 17:39:01 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(r0, 0x0, 0x100, 0x2) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r3, 0x2000) ioctl$AUTOFS_IOC_READY(r3, 0x9360, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat(r2, &(0x7f0000000140)='./file0\x00', 0x80000, 0x40) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r5, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r5, 0x80049363, &(0x7f0000000200)) sendmmsg$unix(r4, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)=@file={0x1, './file0/file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000100)={{}, 0x0, 0x0, @unused=[0xffffffff80000000, 0xfffffffffffffffa, 0x101, 0xfffffffffffffffc], @devid=r6}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f0000000240)={r6, 0x786, 0x1, [0x10000, 0x7, 0x7, 0x4, 0x3f], [0x7, 0xfffffffffffffffb, 0x1f, 0x1, 0x81, 0x5bc2, 0x1, 0x0, 0x19430d1a, 0x2, 0x5, 0xb6, 0x0, 0x1, 0xfffffffffffff9c7, 0x968d, 0x1d6, 0x6, 0x800, 0x5, 0x7f, 0xffffffff, 0x100000001, 0x8, 0x5, 0x401, 0x8, 0x3f, 0xcf04, 0x5, 0x8000, 0x5, 0x3, 0x0, 0x6fe119a0, 0x9, 0xffffffff, 0x20, 0xaa, 0x6bee, 0x4, 0xfffffffffffffffe, 0x6, 0x0, 0x10001, 0x8, 0x1000, 0x4, 0x5, 0x2, 0x5, 0x3c0b, 0x9, 0x0, 0x40, 0x4, 0xffffffffffffffe1, 0x0, 0x243, 0x100000000, 0x7, 0x400, 0x3f, 0x7f, 0x5, 0x8, 0x4, 0x81, 0x9a, 0x100000000, 0x3, 0x100, 0xda69, 0x8, 0xff, 0x7, 0x0, 0x400, 0x5, 0x2, 0xa61, 0x7, 0xfffffffffffffc00, 0x10000, 0x0, 0x9, 0x26, 0x1, 0x8001, 0x3f, 0x172b, 0x1, 0x4, 0xfffffffffffffffb, 0xfd9, 0x2, 0x0, 0x3, 0x5, 0xffffffff80000000, 0x9, 0x100000000, 0x4f, 0x100020000000, 0xfffffffffffffff8, 0xff, 0x3ff, 0x3ff, 0x10001, 0x8, 0x7, 0x1ff, 0x2, 0xfffffffffffffffc, 0x5e989aa5, 0x80, 0x7, 0xcd, 0x3ff, 0x5c, 0x9]}) 17:39:14 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000005e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000340)={0x28, 0x18, 0x0, 0x9, 0x2, 0x84, 0x4, 0x62, 0x1}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000240)=0x40) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000007c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000800)) mmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x3bbde000) 17:39:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="1900000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x5e7270a966ef3db7) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x20, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001380)) openat(r1, &(0x7f0000000300)='./file0\x00', 0x446c84, 0x4a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000340)={{0x9, 0x6}, 0x100, './file0\x00'}) r3 = pkey_alloc(0x0, 0x1) write$P9_RREADLINK(r0, &(0x7f0000001680)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="fe4e6c036a75e557e7058833679325c74cb7acec2defc2021558ebe1b054392accb8e55c8084d90fc20599f6da760f2a5626d44e9a547c3884ff50e0b21e88d772c4e7193f3ec42715", @ANYRES32=r3, @ANYRES16=r2, @ANYRESOCT, @ANYRES32], 0x10) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x120) fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/65) sendfile(r0, r1, 0x0, 0x20d315) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000001580)=ANY=[@ANYRESDEC=r4], 0x1c) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0/file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x77359400}}) 17:39:14 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:39:14 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x2000000}}], 0x7ffff000, 0x0) 17:39:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}}], 0x1, 0x0) 17:39:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:39:14 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, &(0x7f0000001440)={{}, r1, 0x6, @unused=[0x3, 0x0, 0x2, 0xfe], @devid}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000440)={{}, r1, 0xc4a4432bd3a20407, @unused=[0x3, 0x1, 0x6, 0x4], @name="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"}) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000040)=r1) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:39:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2500000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:14 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x3000000}}], 0x7ffff000, 0x0) 17:39:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}}], 0x1, 0x0) [ 1994.798320] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:39:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = creat(0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r3, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), r0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r4, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x785fb3ba}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8446}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xd39}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x20001000}, 0x4840) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001780)={0x24, 0x5e, 0xc21, 0x0, 0x0, {}, [@typed={0xf, 0x0, 0x0, 0x0, @str=' \x13\xe1\x8d\xb2\xfb{\'E\xaf '}]}, 0x24}}, 0x0) 17:39:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:39:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2e00000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:14 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:39:14 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x4000000}}], 0x7ffff000, 0x0) 17:39:27 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}}], 0x1, 0x0) 17:39:27 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:39:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x8000000}}], 0x7ffff000, 0x0) 17:39:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, 0x0, &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:39:27 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:39:27 executing program 3: r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:39:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="3000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:27 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000740), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$packet(0x11, 0x2, 0x300) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000004d00), 0x2f, 0x0) r6 = pidfd_getfd(r4, r5, 0x0) sendmmsg$inet6(r6, &(0x7f00000054c0)=[{{&(0x7f0000003100)={0xa, 0x4e24, 0x1000, @private2, 0x7fff}, 0x1c, &(0x7f0000003d80)=[{&(0x7f00000038c0)="eea1fe67d37481e776067bd00c729df2009f217334039c9feebc78fb6d12fbe6daee73d0c488cdad0ded0f7b14", 0x2d}, {&(0x7f0000003b40)="22f05ec7fce0", 0x6}, {&(0x7f0000003b80)="609a40b66ee96fa5639a6cd981f031e50358b5de05bf726d307496f2518a24e7b9e3ab55301a2b955d7ac6e37127db3f3c178fb0bb9d70d363758b66a83d9d2845f85e9b2335e2a97fef44f5ba37cd39569c1842119c767e5c40a93c088cdbabae7a72896c95b2", 0x67}, {&(0x7f0000003c00)="87c731952e7b958d6bff6741610256bd362f9fc70f3b9769a8b4939d1ef08c87b9ffbab0372dee6b1071126ae934bf2e9e2078e0e4f6a894cb27520bc6b7e91802d3f11ca0432d10df5d03d281c824967a4f892c83ba9e5795ebe18f34c550256e5876fba50bbd532cbbb4fb1571e7d1b72e228bba98371f8c5226e47e0ba936dc8c554aa0278bc4ad3cdaef5498920ccf622b4437b2019a6b00c375decb025f149df27502ceb83a638b4d3525", 0xad}, {&(0x7f0000003cc0)="cf16280d1aefe569c2e6e5362e6aebb95540683f2e919e668c7617cfba8b9b9999c66996", 0x24}, {&(0x7f0000003d00)="2f087c38ff29e2d75d500eea86fb9bc5f255ac40455d2163987021a91acf7d2ad829fa924121833728da9271025c769c13264a7fcd53ec58ba5fe567e653d023206ce118ac0354755590727d62ce9e4118a4934db4c8bfe10c15b921b606f151ef6c6a7d48047d2fb5ae6d5bb749185f72d9b767a5eb25d5d3ff7bfc2ae1b92f", 0x80}], 0x6, &(0x7f0000003e00)=[@rthdrdstopts={{0x20, 0x29, 0x37, {0x2c, 0x0, '\x00', [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @tclass={{0x14, 0x29, 0x43, 0x595}}], 0x38}}, {{&(0x7f0000003e40)={0xa, 0x4e21, 0x8, @mcast2, 0x8}, 0x1c, &(0x7f0000005280)=[{&(0x7f0000003e80)="03cd6b45207b06c5f2a6150f3c276c5784241145f12b093a1526ef20d4817d85919ec16c4fe121159e80b7267e8dd799decddb89d0e27a24c79e79f743980f83206ab5763584d736ce8b5eee58dd072dea0a9ad39e71fea9a8fe6c5d219316a39087fb43038f3e211a419e5a3082f5ed5c3505a9c495b0ebc1bcd071f112daffd2d5e0b72eba05ae51f7cd1b2b1d95e9165a", 0x92}, {&(0x7f0000003f40)="64aa63b0671e9ed00c43268fe8b2d0277f898066ca01bc39b01a8a13969fb4c7c8305e47ae2602cff0eeef5d8e69317e07f4c760bdd8f2b7f93662f892d2fc454d19e338d35c9b31102aa576479a53ee30aa24e29dc6", 0x56}, {&(0x7f0000003fc0)="82c7b1e1773b1d8c8b065cdd38c0e2195d9199bcf19e983e3f086af649abc85528883b989892972b42bdaf0aa8e90158c8b08494036f49c3add25faca13eaa00053723e834ac4dde16", 0x49}, {&(0x7f0000004040)="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", 0x1000}, {&(0x7f0000005040)="5c2a3454e0d5cf277ce5318eceec96026f21e036fb9b358e4e639eb61280ba26328c88f233d044c710f436e673745f8c1d4b6e3f7827124c680a80d8c5a03f73462b13e1d5bc7b3ca24e75c1264f26b36c3a8022410d1606a2d5bdbc3acf333f76093a7400b9247d5c851794daa0615ec8f63da85e84516fb11c0acd3168c88dd8a36bd4b97ee59b172fd004316c8145f65a08fe45c844f8a203448017fc2ae74ebf382c957ccfffa01e44b282", 0xad}, {&(0x7f0000005100)="c4a865b2d3a1e623072bf3f1cd347e8e0fd89bfbb6d43b2b9b627b9f566af1cfc9489d4de6a7ac77ff8988b8b65e085f36984d", 0x33}, {&(0x7f0000005140)="f808ce105ea9e355b099fca2d79307e88cac259bfc717204923bf3f9fe3ac3cd969162fcdf41a613d72be5", 0x2b}, {&(0x7f0000005180)="3bc66fc7738d25d87960b470933cd12f327fbd9c17a03fafa3af79", 0x1b}, {&(0x7f00000051c0)="58b9c2fabc24b30dfd174d4dd9513d958dfbf66eecb9cdbf314a14f0c2525b49cc6b541a1e31a7dd5b11d432b0b438ab6d8e10bdbd1a87185883cc50ddb9e1b556d75b609056135799cd8cfe14d48624d6b6d9fbcb5cac5eaec9a9749c80d11e19f4e7fba8801348654390622475f4afa718b57d05e939dedf10f76e6c3cac1e055702ff12029f6866ce61edee3ea41acf8599c0470b227db8c6cb1a8d6cc84b84c4b78e78ea13df0ff6ba360b32c1f6", 0xb0}], 0x9, &(0x7f0000005340)=[@rthdr_2292={{0xa8, 0x29, 0x39, {0xc, 0x12, 0x1, 0xc0, 0x0, [@local, @private1, @mcast2, @loopback, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, @loopback, @ipv4={'\x00', '\xff\xff', @local}]}}}, @hopopts={{0xb0, 0x29, 0x36, {0x3a, 0x12, '\x00', [@calipso={0x7, 0x28, {0x1, 0x8, 0x0, 0xfff7, [0x40, 0x8, 0x2, 0x7]}}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x58, {0x0, 0x14, 0xe1, 0xa3f6, [0x5, 0x80000001, 0x1f, 0x1, 0x3, 0xffff, 0x3fff8000000000, 0x3, 0x100000001, 0x10000000000]}}, @ra={0x5, 0x2, 0x6}, @enc_lim={0x4, 0x1, 0x1}]}}}, @dontfrag={{0x14}}], 0x170}}], 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000003900)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000180)="380f783a6bb5a12f0487b26ba83b41f9349d9fe1c71023dd0a10aa5e7d330a4c0e4aa0fb0394d6fdd39083112555b3047a94505ab77def4a01e1beb79acb8f755400adab3873cf287c98400758a6493bdfc3caf2caa6249d88", 0x59}], 0x1, &(0x7f0000000240)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8000}}], 0x30}}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000400)="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", 0xff}], 0x1, &(0x7f0000003880)=[@dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @tclass={{0x14, 0x29, 0x43, 0x4}}], 0x30}}, {{&(0x7f0000000580)={0xa, 0x4e24, 0x4, @mcast2, 0x9}, 0x1c, &(0x7f0000000680)=[{&(0x7f00000005c0)="eaa0d912e578648a2d0076ba048d0b9db812d1c28d0fd5ad646f56e709978f15bdccf40ec0bdc580b1846829183cdd99af36415a602b9bc0e83d2d63a6338bf241e476489afdb35d0e32f8ee3c44bbcee1135fb8a12c8a938b0e2ee0add002d84be24bd22397a2bc24185b01a24edf20e2000266a9b37b7858552cd4b0b7b13acf07a3d8a17c91638c1ee83daf6e88035acba8e5", 0x94}], 0x1, &(0x7f0000000900)=[@dontfrag={{0x14, 0x29, 0x3e, 0xffffff1e}}, @dontfrag={{0x14, 0x29, 0x3e, 0x697}}, @hoplimit={{0x14, 0x29, 0x34, 0x6}}, @rthdrdstopts={{0x80, 0x29, 0x37, {0x3a, 0xc, '\x00', [@jumbo={0xc2, 0x4, 0x8000}, @generic={0x0, 0x59, "099f21c46552369ab4cb34e337283d074eec7fef46b4a96867e83951e873089ba342e4da16b95a95aac352421ba042cf9390acbddf3dba251d6aeaf01452b440db39ead2954cf5330087d099f2244963131d7152edd10bd369"}, @enc_lim={0x4, 0x1, 0x9}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x81}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}, @rthdr={{0x28, 0x29, 0x39, {0x87, 0x2, 0x2, 0x0, 0x0, [@private1]}}}], 0x120}}, {{&(0x7f00000006c0)={0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x9}, 0x1c, &(0x7f0000000840)=[{&(0x7f0000000700)="2322adaf60a7b052fe8af5", 0xb}, {&(0x7f00000007c0)="ecc9edef6b6d9d92043eb051e9056ec1306d2ae915c18c898f5ad63d46e2eff6652da62d92c1a09499253950731ebe8307ea16ff6327f2db1252fd390b366b6d459982d027b0274cd29735ace3e7a686cbdbb09b0e8aaeef9539d47990b59b985f", 0x61}], 0x2}}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000000a40)="e59b780d28fdcc84d19b345f29934f44c9d97e14574148cc7fbb6fc89366fe09b33820c8dfe402ae4ba745faa71656a0232c9eec2e3a733800e75295a688586c848d215743315c4ff97dc1133fbf6f1ae6e57d6e1dea95865248bf423820189e6530062da42fcb078d2264e6a7b4aca770de5789dbe0263be91633db8b9cce11317bd1dfba5e5350c7fee4952da357eaff01b6137bd18cb79e93e1d0871c0548b148e11348c2adb621a98f6ea0efd5c7aa411b4a001f46c8225c08ead152eff030c3e6c97e2b59379163e1033bc4b98fd0dee00731877d7725", 0xd9}, {&(0x7f0000000b40)="8b7156d288e254d685ee823e90dc3c3ef4400c29ef2076568ee4e90c307e5729f464b6839f4ceb0f499759733adc01e2f64fb9828853247b67f3a6b1733bec6682a0f5140b9f5a44238ff4d1e181eb05abcac2d4a4a5a7087bb1769e6d38227b447c276c1d648ea84637d994fd6639882f5a538c50bcb65f5e911ddb3e40316b7ba6a7a86bcf598609c02d7a61680119d8e2e36ae081d049fc38c077c46d601f0bc51e979784300ccab7", 0xaa}, {&(0x7f0000000880)="7f62290e8b249fab23a01a42cd", 0xd}, {&(0x7f0000000c00)="b4cfef689682916ff55969d4d16c9950556e4ce0836199a1e65654c21683b9b5963953c5a8a719e7e28bc368282babd1595d71e8f73d7deb7b92a342bc0cdfb79b6384e46cbf2d3a46a19fc22698028348572259eb190724866c4a902e4f6f087ecca7ab92d210679f71605bfca51a795a686cea80ee45de768a31f1398dbfa1e00994a397e353a7c1a4989a2677ad9b8a3b4f8d747b086609d9667b8efc396b635113", 0xa3}, {&(0x7f0000000cc0)="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", 0x1000}, {&(0x7f0000001cc0)="9153a9fa801a023853f5d5a784d1ba7789c1e4d0a16eca1ec18bbb71a2271695a6caa868e50dac4b3cd021b3bb0a5db9450015fc2af44aefc75a54f9a200", 0x3e}, {&(0x7f0000001d00)="993cd73aa3a5892a457e0c3b21be7b896bbf49bb3097ffcbcfe169950d32f4b4498a8c478c0bc195db81520e0f6b1eff87c74cb0405beb8d3d40af2bd06067406ff5333f6fd0a5c8dc45ad7b54552345fe32d585267eca3f7532211cbdfe2b576a8a716566b35d8cfe26fc2e90356aaa34aa2f54155eed4a987cce92709105c2ab192bd0cb8573331518b8fe9d0e7d5d6a5e34460b43dd8231e1d04120189f605df0c4cde149417740a8acc6ddc48194515350631939b144700a3f6d8599eb7bebd81fb49af6cd5a098ffc9518fa2bee775f25d3aedbfb4df0a9d57608373dd7502ce662ed562251fc7ccf5e306b", 0xee}, {&(0x7f0000001e00)="5da9ac7cf4098dc3011489d8376226ba", 0x10}, {&(0x7f0000001e40)="f708be820bbe51fbd9ccfee641f8c834cbde6929b8d7748333a29953e7ded5de4c52d45fca7efeeb9f272eeb5d32247a6136fc38a6cf22c613f8d030f0d1ef30e8d179011205c96ca3aae72b1c5361ed46261d81e543163a75f386ddcbb8b168c37f759c7de8870599f272a8fb86b2923548b76c57b660d2b9afa1464bad4dbf11f72d560d1b935d0efa5fcc5ade880f692f95145e7a671673ef5d5790d0bf0b97bf9b0d420085e644984960865208", 0xaf}], 0x9, &(0x7f0000001fc0)=[@hopopts={{0x1040, 0x29, 0x36, {0x0, 0x204, '\x00', [@hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}}, @generic={0x8, 0x1000, "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"}]}}}, @rthdr={{0x98, 0x29, 0x39, {0x21, 0x10, 0x2, 0x2, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @remote, @loopback, @private0, @local, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote]}}}, @hopopts={{0x30, 0x29, 0x36, {0x0, 0x2, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00'}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x10000}}], 0x1120}}, {{&(0x7f0000000500)={0xa, 0x4e23, 0x1, @mcast2, 0x10001}, 0x1c, &(0x7f0000003580)=[{&(0x7f0000003140)="81bb66733d64065ef796d4ffb22370115dbd8ec2ebb4d8de2ad7d8cc3821ab443bb9c6a9e98aa69ad5a49d2db79001a54e5c42c0149aeffbe218df71165e91c61194b44629f92c000188998da6e74fc700bd93f591befb0622b5b67d56a3809a33c4732fc4245a221172a7b7b89ffc84e596d62022fd05f2983f0778f2bbb3714ea45f057fbcb170820f7975d65cc525", 0x90}, {&(0x7f0000003200)="ca3e6ea87bec85d4d99f84b06c093d5bde60ccf3c321c58979d9c6e2e0842d8c08f6c54cdf15d045503b3cf399f8239f29727792bd89fe29ef205dd1eda4c42174b361316c9f8151ea13d901fce929d60f62d99b09dee9969aa384f9f431043a4652df16a68a66507b2e654817e97a6b55e667fc3027efb9221cdf93501f41811a837491eeba18582084a49b0abf9e6dfed5d4c563985743f2093470aa8a1c43efe28fd8c0a4e91bf5e16f8c9653be9b7f9150c5282c13e3a37893de3488f58af97cf7ea", 0xc4}, {&(0x7f0000003300)="7675bd42c90674cb36472e2b1a4aef9388affdc02590abe855a61709e40a45b72fb028eef63b73d69a332c775be8405875cd92853cc7384147d8821b80e118ae6b9ad02df553051d53e7da115f80a2ce164b89e4b013f83e4c28265ec60b325509bfec9e1121b44fa7d150eb05f901b1ff0a3d78630971c56a108b67df095ec77d55ac44ff3f159d53b5cda924d9c9158b78fd081f5120f0e9faec8d791782c01084ab8f201a7600d24da8ae876b81e6ef6b991ca7404a5c6680fcce8c40510ba210d9cbee111e69c56b1dca64fe7ad84d37d11e7301fa8c7a7a745cd3781fdad7", 0xe1}, {&(0x7f0000003400)="32163b12048a05613246e6f4c58e4122f47ac66e4b2040033816fa5f8f0e7dce2360efee69c75e8356e22afee129992e5427c3028d21fc070a4522c85fc1d0a804614a72923f30bea4b9afe3e4e6412a934598b597aece1b733e011fc98c2b234c4d5bed8770d2ae1c8269b13b12821ff4f511", 0x73}, {&(0x7f0000003480)="a5d6188136584c6cee0a7fe4d86b6d114d8080d87dda0cc15fe922f7b78b70c9ce55dd9d380929f2c5f1e9b2add1cbe9cd3dd76118d73c54b2726a742dda6792237524115e9def2afdad74298e7ccf49c6df519bdd0b39e94a8e70a4470209c813f48e9c3bc7362ba78db6a064e986d8f88e8b153f7afac26dabb992d540de79cd4f36037fcbc36010d21a5d2ad19bdd540f65b261b6757b066367631a7558576a1c07bcad3770f4f48a39ddf532c331883d336005b382acee101f42a27108ec3bf07211fb831f65ce343913c6300162f5c26ba29d65bb69f541538f7d8e6274ce097f48a3", 0xe5}], 0x5}}, {{&(0x7f0000003600)={0xa, 0x4e20, 0xfffffffb, @remote, 0x2}, 0x1c, &(0x7f0000003740)=[{&(0x7f0000003640)="68bd4247", 0x4}, {&(0x7f0000003680)="f9554b2669c147e14211c0200814bf07492d149a2acc2e12851b318bc58fad8a35b0562495cd52", 0x27}, {&(0x7f00000036c0)="2a3e1ef5aed6bb7802b922f4f4aa4d054d1eef0f84710c82a7c66f9281c241a482f6c6e075e8780eadc16d67dba5f5a78dea84f0e7cb25885caf24f4efd459b318", 0x41}], 0x3, &(0x7f0000003780)=ANY=[@ANYBLOB="14000000000000002900000034000000030000000000000024000000000000002900000032000000ff020000000000000000000000000001", @ANYRES32=0x0, @ANYBLOB="00000000180000000000000029000000390000003c0001fc000000001400000000000000290000003e000000900c0000000000001400000000000000290000004300000001000000000000f92800000000000000290000000400000006010000000000000102000005020001c2040000000900000000000000000029000000390000008806010500000000fc000000000000000000000000000000fc010000000000000000000000000001fe80000000000000000000000000002000"], 0xf8}}], 0x7, 0x40000) perf_event_open(&(0x7f0000003ac0)={0x1, 0x80, 0x2, 0x69, 0x5, 0x3, 0x0, 0x10000, 0x58624, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xff, 0x7ff}, 0x4204, 0x2, 0x2, 0x6, 0x40, 0x1ff, 0x5, 0x0, 0x3c0a, 0x0, 0xfffffffffffffeff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) 17:39:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x9000000}}], 0x7ffff000, 0x0) 17:39:27 executing program 3: sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x0, 0x0, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x66}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x84}, 0x815) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x2, 0x40) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:39:27 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6e00000000000000}}], 0x1, 0x0) 17:39:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="3d00000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:28 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:39:28 executing program 2: r0 = creat(0x0, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(0xffffffffffffffff, 0x80083314, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) r1 = syz_io_uring_setup(0x3a76, &(0x7f0000000380)={0x0, 0x55e9, 0x0, 0x3, 0x16a, 0x0, r0}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000140)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd, 0x0, 0x0, 0x5, 0x8, 0x1}, 0xfffffffd) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f0000003000)={{}, "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"}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x10) clone3(&(0x7f0000000180)={0x3040100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r5, 0x10000000) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f0000000240)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, r5, &(0x7f00000000c0)={0x0, 0x20, 0x12}, &(0x7f0000000200)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r7}}, 0x8) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xf, 0x0, {0x0, r7}}, 0x5) write$binfmt_elf64(r4, &(0x7f0000001480)=ANY=[@ANYBLOB="7f454c4600006465b13882e1b1050e91387e2783dc8ced400000000000000003003e0000000000dfffffffffffffff4000000000b20afb2a0e2e6e00000020000002000000000000000000003800020000010000000003"], 0xaf2) close(r4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:39:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x11000000}}], 0x7ffff000, 0x0) 17:39:41 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:39:41 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8004000000000000}}], 0x1, 0x0) 17:39:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, 0x0, &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:39:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(r1, 0x0, 0x100, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x18) inotify_add_watch(r0, &(0x7f0000000040)='.\x00', 0x2000003) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r3, 0x5c33, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000140)='./file0\x00', 0x4000008) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x0) 17:39:41 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0xff, 0x1e) openat(r0, &(0x7f0000000200)='./file0\x00', 0x40800, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000080)={[0x20]}, 0x8, 0x800) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x24000, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x10, r2, 0x8000000) syz_io_uring_setup(0x1b78, &(0x7f0000000000)={0x0, 0x24b7, 0x10, 0x3, 0x202, 0x0, r1}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index=0xa, 0x4, &(0x7f0000000240)=[{&(0x7f0000000200)}], 0x1, 0x0, 0x1}, 0x4ea) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x10f) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="000000004a0000001c2f66696cd33000"]) ftruncate(r5, 0x9) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='personality\x00') fcntl$setown(r7, 0x8, 0x0) 17:39:41 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x7, 0x41, 0x5, 0x80, 0x0, 0x3, 0x202, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x20080, 0xe5bc, 0x2, 0x9, 0x6, 0x10000, 0x2, 0x0, 0xffffffff, 0x0, 0xffffffffffffffe0}, 0x0, 0xd, r1, 0x1) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:39:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x30000000}}], 0x7ffff000, 0x0) 17:39:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000400000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000070000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x31000000}}], 0x7ffff000, 0x0) 17:39:41 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8004020000000000}}], 0x1, 0x0) 17:39:41 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v3={0x3000000, [{0xada7, 0x8}, {0x2, 0x3}], r1}, 0x18, 0x2) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:39:41 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 2022.093988] sg_read: process 1397 (syz-executor.3) changed security contexts after opening file descriptor, this is not allowed. 17:39:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="200000007f000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:42 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x40000000}}], 0x7ffff000, 0x0) 17:39:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000}}], 0x1, 0x0) 17:39:56 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:39:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, 0x0, &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:39:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x60000000}}], 0x7ffff000, 0x0) 17:39:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001500)={0x0, 0x8000}, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0xffffffff}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 17:39:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, 0x0, &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:39:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2002000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:56 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) pread64(r0, &(0x7f0000000680)=""/141, 0x8d, 0x7ff) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/159, 0x9f}, {&(0x7f00000001c0)=""/196, 0xc4}, {&(0x7f0000000340)=""/214, 0xd6}, {&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000440)=""/155, 0x9b}], 0x5) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='io.stat\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000940)={0xe5, 0x8, 0x9, "a2e7f2b474e17af88aeba1ad5565f45663201f3581703b5698094fdcc4504128d64cb92289a30af1c5c2b4fdb43aeb1900638a5769916f02b4d22312ad2d8b2f26524c8734af1f716741658e67728ea2d68e1a75f90bebfcf5b4410d19687174443d360cd4ce2d8813597e757535f669bd7fcc52e0c4ebece739ec8277b55e34e635b914cae550d1c75c2ee2eb06fb34844b897357366bce5c80a3f2dafb57ce8af85488f3e01e348ff7f46d6186367eb165c56ed42bf75f9f5753c6b36b28c7905646f36194e409852483fb58af9fe72714033881716682210bd72b7ec161b3f05fd733a7"}) readv(r1, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/86, 0x56}, {&(0x7f0000000580)=""/170, 0xaa}, {&(0x7f0000000840)=""/240, 0xf0}, {&(0x7f0000000740)=""/79, 0x4f}, {&(0x7f0000000100)=""/54, 0x36}, {&(0x7f0000000180)=""/48, 0x30}], 0x6) 17:39:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v3={0x3000000, [{0xada7, 0x8}, {0x2, 0x3}], r1}, 0x18, 0x2) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:39:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x7ffffff7}}], 0x7ffff000, 0x0) 17:39:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000}}], 0x1, 0x0) 17:39:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2003000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:56 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180)={0x0, 0x277a, 0x0, 0x6, 0x2b9}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000500)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x30, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080), 0x4) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x30f041, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r4, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@ETHTOOL_A_COALESCE_TX_MAX_FRAMES_LOW={0x8, 0x11, 0x9}, @ETHTOOL_A_COALESCE_USE_ADAPTIVE_TX={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x4001) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x7ff, @initdev={0xfe, 0x88, '\x00', 0x7, 0x0}, 0xb3}, 0x1c) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca", 0x1a}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000400)='cpuset.mems\x00', 0x2, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000440)) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 17:39:56 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) r1 = syz_open_dev$loop(&(0x7f0000000040), 0x5, 0x200800) write$binfmt_elf64(r1, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0xe5, 0xf1, 0x2, 0x7f, 0x7, 0x3, 0x3, 0x1, 0x323, 0x40, 0xb5, 0xffffffff, 0x8, 0x38, 0x2, 0x9, 0x81, 0x7}, [{0x70000000, 0x6, 0x3, 0x0, 0x1ff, 0x1, 0xfffffffffffffc01, 0x4}, {0x1, 0xffffffff, 0x3, 0x8, 0x200, 0xcb, 0x0, 0xffffffffffffffff}], "c4674fdb6b65a1c360c4a893fa37ce402bc35805b6a5d09926551519bfab64721c8db5d3cd71945bd1b17de5768a506329d4b86db13e06dc5f038e4e4fe3b56811f3d555c1e9c0ffeb216004b60185f23394d13c59fd824190086efee2eec7b04372364e951eb077fbcac499af293c1c6e967eeb30afbc94824193711a44add780d6102f01b66c6056603da1dedf9015e25854aca43129bde63d", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x64a) readv(r0, &(0x7f0000000040), 0x0) 17:39:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xdc050000}}], 0x7ffff000, 0x0) 17:39:56 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:39:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v3={0x3000000, [{0xada7, 0x8}, {0x2, 0x3}], r1}, 0x18, 0x2) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:39:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), 0x0, &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:39:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2004000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000}}], 0x1, 0x0) 17:39:56 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) syz_io_uring_setup(0x7f02, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000180)=@sco}, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x200000c, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r0, r3, &(0x7f0000000940)=@IORING_OP_STATX={0x15, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000800), &(0x7f0000000900)='./file0\x00', 0x7ff, 0x4000}, 0x2) r4 = getpid() ioprio_get$pid(0x1, r4) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) r6 = socket$inet_icmp(0x2, 0x2, 0x1) sendmsg$netlink(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)=[{&(0x7f00000001c0)={0xdc, 0x38, 0x300, 0x70bd2b, 0x25dfdbfb, "", [@generic="42738ae290de363596aa49bce8c0a15011e0a20d2160bc8d65bfb4579f44b613e87943983e1ddd5c7a6fae8478322b80aa5eb78ae178280a06ae543743d2efc67d404b40d83dc5726ac491d226eb5f17eb5d26fb0f82a0", @nested={0x74, 0x86, 0x0, 0x1, [@typed={0x8, 0x8, 0x0, 0x0, @fd=r6}, @typed={0x4, 0x60}, @generic="efc723473e", @generic="f105cfeaece112eff69aad3d302419f905e9ef505504c58e92e2511441870fe61b506a", @generic="36155a1ed1f5586e873b7e09759ca2c28eab95c167043d16fda3f70b3576d36f27b3127c9bcc8ff0d887f45a6f42556daa786714", @typed={0x8, 0x78, 0x0, 0x0, @u32=0xff}]}]}, 0xdc}, {&(0x7f0000000340)={0x454, 0x17, 0x400, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x8, 0x6d, 0x0, 0x0, @fd}, @nested={0x2b0, 0x4b, 0x0, 0x1, [@generic="b2284ea9697ab301481949", @typed={0x8, 0x1f, 0x0, 0x0, @u32=0x7a9}, @generic="aeaf2cb0789145106cf03982f685c16afd6c2d97878c7a14165f7f9ece1061162220e998ea92ee60567cdeca65b9f28f0e273ec4cfaa9ec0d0a94be78d90209d9e8c5ac54be6dd9958768f7264bee3", @typed={0x8, 0x47, 0x0, 0x0, @pid=r4}, @typed={0x4, 0x7b}, @generic="25a650e8d4ab6e0a384336cfa51a1101662b10505b4f9664632b7b25656b454273a14ae80855c2f7d11b630f434341654637d456db70d3b09d0adb763bf6dd619c2267a05117dfc56df19b6ed2d017dfc6c8eaceb7fea2dca048b8fb29b76fabe2cd794b70d88d4f4263d707949b1f515074eac5f33eef5188f1860e556b8b9db5a7c8a1e7ebfbdd241ee59678607131a0771e987d59ece0670f0e9e95a1beaf79313f8e63e60f3b8ecc54b0dbd2076563771fccea25ec4c2e6cb6a435b1b789a4ae603dc7f565029de5ceae094b1018a919f0a067ced658f2f7137c3bad0ad16bdd77c91f37b5aa6e6c7e62ee894f1c09c604", @generic="7e3805262550c299f4a40fbffea1ee2fd7a9aba0b2542a8ce3392db4732c8d953250eb234e3b3b", @generic="24ae6a82267e409c344e185d375562dfefb1d16f02025aabe7227168d4d2d524b65b795b65c18c241a24c810ad5051fb33927bd5278c96e83b09935dfd7d65d946ca0601cb5af6ae12171b2722dcc9eb47af5c6923f8cde8bf84b944b10c033456e23516988fb8c7127f7e23d5022f85b6d956a21e1cd3269c290f9ba1f36461dfa489390b1cf5facee1614085125acf88d56e450fd252a6b85e80773ec3219c26cfa3c317d22ac211ff2e0cafe8da05330e29143e100eafab8e4be0485509b508f791253e2156038dfcfb5ef7789b5a801b0a2742b07dc617", @generic, @generic="ba1a76f49c790ea1924f65a5c41fd2fa0ac62fa8978c801d3700277e7dbae37e734855f337fc3733f320946f35c8cccaa778b1092fce0c5bdaf4aadd8ac1f6382dd55f9124f57f8f6ce515"]}, @nested={0x8a, 0x2f, 0x0, 0x1, [@generic="31255cf5f2b64376a1837a50819597ce2b71d839780e7ecc04561b615062bf59d98e3d8192681e3d8d919764bfe5ef9f042293fc88f3724a6c2b3811866c3f56d1edf5b919b263cca81d79a8bafee240173797e16bb8d32a29ca734037aef9964287dc8af7f4bd3c9c01", @typed={0x8, 0x83, 0x0, 0x0, @u32=0x6}, @typed={0x8, 0x8b, 0x0, 0x0, @u32=0x8}, @typed={0xc, 0x5b, 0x0, 0x0, @u64=0xd2}]}, @generic="9c9b90ffb527158cbfa96d0e52ec0c936b0f81", @typed={0xc, 0x4, 0x0, 0x0, @u64=0x7}, @generic="5c9fb9276d708cf182bb1dcfd687c8cafb288c38f65a05d38f26ea3310abe2d39e3685ef7b286783b7ca46730ccb13111242f4d951134c74b794920a65df3651734e027eb62d934190210ae3798681d6f0712b15b007e5b3e582f279ad14e383e8a37b6fd941df91fef3a7f1eb75d6f4470eee5f0199661991d7c1758a67ce5e1828a5e6869ed31391597a9afda30a6bad975e23f3a13551e61d4aab95945fd0911af52fcc3f9b2d5c0bae5eaeff67c1e005ecf96b45d7eb85e118c3d4172116926b5445272d26b9cd363232bae285a7c03c68049ece", @typed={0x8, 0x27, 0x0, 0x0, @fd}]}, 0x454}], 0x2, 0x0, 0x0, 0x4}, 0x0) ptrace$getregset(0x4204, r4, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)=""/129, 0x81}) 17:39:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xe8030000}}], 0x7ffff000, 0x0) 17:39:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2005000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:39:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v3={0x3000000, [{0xada7, 0x8}, {0x2, 0x3}], r1}, 0x18, 0x2) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:39:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000}}], 0x1, 0x0) 17:39:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r0, 0xfa2b, 0x3) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:39:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:39:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xeffdffff}}], 0x7ffff000, 0x0) 17:40:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), 0x0, &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:40:09 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180)={0x0, 0x277a, 0x0, 0x6, 0x2b9}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000500)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x30, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080), 0x4) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x30f041, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r4, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@ETHTOOL_A_COALESCE_TX_MAX_FRAMES_LOW={0x8, 0x11, 0x9}, @ETHTOOL_A_COALESCE_USE_ADAPTIVE_TX={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x4001) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x7ff, @initdev={0xfe, 0x88, '\x00', 0x7, 0x0}, 0xb3}, 0x1c) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca", 0x1a}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000400)='cpuset.mems\x00', 0x2, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000440)) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 17:40:09 executing program 3: ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000040)={0x1a, 0x24, 0x4, 0x18, 0x3, 0x7, 0x0, 0xfe, 0x1}) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)=0x0) r1 = getpgrp(0x0) r2 = creat(0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r3, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f00000002c0)={0x80000000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x21}, &(0x7f0000000140)=""/8, 0x8, &(0x7f0000000180)=""/144, &(0x7f0000000280)=[r0, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x4, {r2}}, 0x58) 17:40:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xf4010000}}], 0x7ffff000, 0x0) 17:40:09 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r0, 0xfa2b, 0x3) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:40:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2006000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:40:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f00000000}}], 0x1, 0x0) 17:40:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2007000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:40:09 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000}}], 0x1, 0x0) 17:40:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xf7ffff7f}}], 0x7ffff000, 0x0) 17:40:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r0, 0xfa2b, 0x3) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:40:22 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:22 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:40:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), 0x0, &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:40:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2008000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:40:22 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xff030000}}], 0x7ffff000, 0x0) 17:40:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000}}], 0x1, 0x0) 17:40:22 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x900, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f00000000c0)=0x1000) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000340)={0x1000, 0x4, 0x3fcf3cb1, "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"}) 17:40:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2009000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:40:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), 0x0, {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:40:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:36 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:40:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="200a000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:40:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000}}], 0x1, 0x0) 17:40:36 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x3, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000000)) 17:40:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xfffffdef}}], 0x7ffff000, 0x0) 17:40:36 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="200b000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:40:36 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xffffff7f}}], 0x7ffff000, 0x0) 17:40:36 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000100)) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000880)={0x0, 0xfffffffffffffffb, 0xf1, 0x6, @buffer={0x0, 0xcd, &(0x7f0000000900)=""/205}, &(0x7f00000006c0)="8215e2a61b24778d6b56c4e118c665d0118a3c529c9fb5886e394aa736effe02d0655d40adef35a1dea4e0eff0237f3099c83fa952c4ad896137200e6ee23820f4621dc1591db476aa96b28df95e13f3cdee49701473e0af396e90071e0e828111a643ec6fd068550fd59a82f785caf2f0e7bc7bf053af6d33ec7930856dbc07d11c7ba64560c974aae3fb04ecc0acce164ac0ef1ae284328a7d64b6a4a0b5bf59fd403857194695a31a69d878dcc451319d87477a21f42f401b23abc6002c30a64c09b9c4866a24e3f1f41d24737760c9c779fc74b05a4665104fdb2e974f4a1be1c89b47f68ee949af91121302196d60", &(0x7f00000007c0)=""/94, 0x9, 0x10, 0x3, &(0x7f0000000840)}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000bf6000/0x1000)=nil, 0x1000, 0x1000000, 0x8010, r1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) 17:40:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}}], 0x1, 0x0) 17:40:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="200d000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:40:49 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) syz_io_uring_setup(0x3006, &(0x7f0000000040)={0x0, 0xa658, 0x4, 0x0, 0x32f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)) r2 = syz_io_uring_complete(r1) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="5a00000004000002ffffffff47deffa385ff0890cad226b05688540c32824af9c5a88f6d9f5cbdde82c389e2a13079f6ff7f000000000000e726c6401191632be38e94a9e65d00e3577dae73747455f15dd96d5091ce4110035e73ec9ac50f655dbba90081f516213ad8cc4e6e3bdb391b59d449418c9caf70010092b9238238837660cca8befc2a6d18f5e987249719ab5e4e6afe9edf896b8eb98cef13b4b1ab46045c27289f102dc7a2ccaa0da94d5419513f22b53811b5ef1fe208e51fe90cc4bab89b7bcd075682f0cc7fb303e14b7e7135a5bcf797cfc19620e4508bc893"]) 17:40:49 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000}}], 0x1, 0x0) 17:40:49 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:40:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x4000000000000}}], 0x7ffff000, 0x0) 17:40:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="200f000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:40:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), 0x0, {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:40:49 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}}], 0x1, 0x0) 17:40:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x20000000000000}}], 0x7ffff000, 0x0) 17:40:49 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2011000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:40:49 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(r1, 0x0, 0x100, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0xd9, 0xf5, @buffer={0x0, 0xf8, &(0x7f0000000040)=""/248}, &(0x7f00000001c0)="080bb4e527e4af94ceda6a0769cb9a8736b17c168189871261f0d61ac425ed32e99f0731597c24ce3ff3e5f53a730d77f6e6a782af89c1caf882aee3239b7cb2d4bbdcb426138c28b6d8a289e993c48c3e711b879af864528aad20e42f3611f37713c34f09f361b0001e9a95689371d374a6613e369b31c620b2745619b527deabec07e2659f873e9d4eb7455b7cd975e83eaa462c3e048984c6183f6647897f5405ab7fd4f0b6bdda6651f038b99bff0b3de490b15f40f0ad6da644264d8c44319ca2963998739d257a2f860cf1f733d1aa7a30ae1d8ac018", &(0x7f0000000340)=""/210, 0x4, 0x10036, 0x101, &(0x7f0000000140)}) 17:40:49 executing program 5: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:49 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, 0x0, 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:40:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x1, 0x0) 17:40:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x40030000000000}}], 0x7ffff000, 0x0) 17:40:49 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:40:50 executing program 5: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:03 executing program 5: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="202e000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:41:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x100000000000000}}], 0x7ffff000, 0x0) 17:41:03 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:41:03 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x424800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) syz_open_dev$sg(&(0x7f0000000100), 0x8001, 0x200000) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1d1000, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x400242, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(r0, 0x2, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x6, 0x60440) 17:41:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), 0x0, {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:41:03 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, 0x0, 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2048000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:41:03 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:03 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x5, 0x0, 0x12, 0x4, 0xad, "f7b8943fb1926f31c589e2bc4b792acc71a456195d61c929df9cdd002bd6dd86296e8ec28c2e68cec96bd4b2294ce034619db8c18d3b7b6a06da85a962a576fb2cb6f65a7e3f70f53bf38980c2ce6513e44868635ef41ede426035718c8f9a3bfb643809e799555d22636cd3fbc9f3f4b887146c2899829ceb18957dfd566106b40fe70d91fdac4a8e3fb7ff65e34471d80215c6bf756db8f37a14775904c794ab207c3c802e883c2157e18142"}, 0xb6, 0x1) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:03 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}], 0x1, 0x0) 17:41:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x200000000000000}}], 0x7ffff000, 0x0) 17:41:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x300000000000000}}], 0x7ffff000, 0x0) 17:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="204c000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:41:20 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0) 17:41:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000) r2 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x1, 0x80040) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000080)) 17:41:20 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, 0x0, 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:41:20 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:20 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:41:20 executing program 2: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2060000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:41:20 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x400000000000000}}], 0x7ffff000, 0x0) 17:41:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) r1 = open(&(0x7f0000019480)='./file1\x00', 0x440200, 0x1c) ioctl$SG_IO(r1, 0x2285, &(0x7f0000019400)={0x0, 0xfffffffffffffffc, 0xd2, 0x9, @buffer={0x0, 0xc3, &(0x7f00000191c0)=""/195}, &(0x7f00000192c0)="6d180d9c131e1c00cbf02bb2c3e752b2101b706ca2a60b83e65c56b61a6426ff4ac9545aa1e60a5a953f1416f5928579fe30086c843e7ae0bb842e8884d428708caf24afbf8b974293c4e63ea14eb08a67df117ee28c116a96d69be77e422e2186259a1ff626a2a77d412e584c50defb130ae7137a7366f791cecb175fe67133b9513324aa659061bcda443f8fdcf4ece74dd588604bceb8e92fec182ec2375972b020477b86b33912096d84bd0ddb2607cedd052bc3b692a18c3e4b2854544fce73369380a584b95fe5d8c5d7b42e19a6d4", &(0x7f0000000100)=""/166, 0x80000001, 0x1, 0x3, &(0x7f00000193c0)}) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/102400, 0x19000}, {&(0x7f0000000080)=""/13, 0xd}], 0x2) 17:41:20 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x1, 0x0) 17:41:20 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2068000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:41:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="206c000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:41:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:33 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:41:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x800000000000000}}], 0x7ffff000, 0x0) 17:41:33 executing program 2: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:33 executing program 3: pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000004, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000000), 0xe3, 0x100) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}], 0x1, 0x0) 17:41:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:41:33 executing program 2: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:33 executing program 3: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000002e2f666978978cc99711bbecb172b26c653000"]) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0xffffffffffffffff, 0x20800) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = dup3(r4, r5, 0x80000) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r6, 0x10000000) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, 0x0, &(0x7f0000000240)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, r6, &(0x7f00000000c0)={0x0, 0x20, 0x12}, &(0x7f0000000200)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r8}}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_FSYNC={0x3, 0x3, 0x0, @fd=r2, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r8}}, 0xda) 17:41:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}], 0x1, 0x0) 17:41:34 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x900000000000000}}], 0x7ffff000, 0x0) 17:41:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2074000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:41:34 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:34 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:41:34 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:34 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x1100000000000000}}], 0x7ffff000, 0x0) 17:41:48 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:48 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x1, 0x0) 17:41:48 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(0x0, 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:41:48 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x20800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:41:48 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000040)) 17:41:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="207a000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:41:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x3000000000000000}}], 0x7ffff000, 0x0) 17:41:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:41:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000030080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:41:48 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}], 0x1, 0x0) 17:41:48 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2010040080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, 0x0, 0x0, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:42:03 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(0x0, 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:42:03 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0xa248754423613b2c) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80800}, 0x8001) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r3, 0x0) r4 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = dup3(r5, r6, 0x80000) r8 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x2010, r7, 0x10000000) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, 0x0, &(0x7f0000000240)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, r7, &(0x7f00000000c0)={0x0, 0x20, 0x12}, &(0x7f0000000200)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r9}}, 0x8) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd=r3, 0x31d, 0x0, 0x80000001, 0x2, 0x0, {0x0, r9}}, 0xfffffbff) openat(r1, 0x0, 0x100, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000100)={0x3a, 0x81, 0x0, "e706f4ceb4b1024ba733ee97c4f142c300b94e7c281a9df04b392b8326c7570fbfdb0c0224171490390a794d475d69abdfcd86bfa617f8f6452f"}) read(r0, &(0x7f0000000040)=""/76, 0x4c) 17:42:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x3100000000000000}}], 0x7ffff000, 0x0) 17:42:03 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x1, 0x0) 17:42:03 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000050080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:03 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}], 0x1, 0x0) 17:42:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x4000000000000000}}], 0x7ffff000, 0x0) 17:42:03 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000005, 0x44010, r0, 0x47af1000) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000060080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:03 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(0x0, 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:42:03 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}}], 0x1, 0x0) 17:42:18 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000070080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x3a1102, 0x0) r2 = openat(r0, 0x0, 0x100, 0x2) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)={0x1c, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r6, 0x200, 0x70bd28, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x4, 0x54}}}}, [@NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x20000800) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r7, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, 0x0, 0x0, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:42:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x6000000000000000}}], 0x7ffff000, 0x0) 17:42:18 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, 0x0, 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:42:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}}], 0x1, 0x0) 17:42:18 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xdc05000000000000}}], 0x7ffff000, 0x0) 17:42:18 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, 0x0, 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:42:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000090080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:18 executing program 3: sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x200, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4000805) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xe803000000000000}}], 0x7ffff000, 0x0) 17:42:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}], 0x1, 0x0) 17:42:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20000a0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xeffdffff00000000}}], 0x7ffff000, 0x0) 17:42:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e}}], 0x1, 0x0) 17:42:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:33 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20000b0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:33 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, 0x0, 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:42:33 executing program 3: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) 17:42:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, 0x0, 0x0, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:42:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xf401000000000000}}], 0x7ffff000, 0x0) 17:42:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20000d0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:33 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="b900000008000000008001003a6907b43568cd59828ad1a22047c4d51d9968c1f8375e0deedc2c892ec2c4e4acdd50760267d65fb6dcce8c4d8a793a26386c090b5c2e4a5f05c525b93e10c7befd3814bf4fb21c4d776d5d9cee2fcb765bba402668e176ad88e4108dee0ee26a611edca1030bb22954012cad195009d6dec5ae48c91e3f4e713d27d58ba478cdf256452dc93f4e8b877dadac81bbb7b1aeb823fb14ba8e85161397d5cc974b15cb9114d600c1f696f4f9cd6b6c58dfe3c28db9ad39047c16"]) sendto(0xffffffffffffffff, &(0x7f00000001c0)="45a85aaf62ccc37c83d13188c9927c268a638b3fe2f14196a4bd28c133c45feaac8af588f87b4482b297e4b574c838161a43a581972ff79d562ad81f7dc4c4b16d217c82", 0x44, 0x20000800, &(0x7f0000000240)=@l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x31}, 0x4}, 0x80) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xf7ffff7f00000000}}], 0x7ffff000, 0x0) 17:42:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc}}], 0x1, 0x0) 17:42:33 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:42:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xff03000000000000}}], 0x7ffff000, 0x0) 17:42:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, 0x0, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:42:33 executing program 3: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcf0}}, './file0\x00'}) r1 = socket$inet(0x2, 0x3, 0xff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000000)="0183ae40f3fdac402b01fa055e4299bd37dddcc8", 0x14}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @private}}}], 0x20}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x200}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x40) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000340)={0x7fff, 0x5, 0x0, [{0x100, 0x7, 0x4, 0x0, 0x1f, 0x3, 0xf3}, {0x0, 0x7, 0x7ff, 0x40, 0xdc, 0x80, 0x1}, {0x9, 0x6, 0x80000004, 0x8, 0x2, 0x2, 0x23}, {0x5, 0x737, 0x6, 0x40, 0x2, 0x9, 0x2}, {0x65de, 0xf9, 0x1, 0x20, 0xfa, 0x2, 0x7}]}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r4, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20000f0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4}}], 0x1, 0x0) 17:42:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xffffff7f00000000}}], 0x7ffff000, 0x0) 17:42:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2004100080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:47 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:42:47 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x7ff, 0x161883) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) readv(r0, &(0x7f0000000300), 0x0) 17:42:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, 0x0, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:42:47 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:47 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:42:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2020100080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, 0x0, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:42:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}], 0x1, 0x0) 17:42:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000110080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:42:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0xffffffff00000000}}], 0x7ffff000, 0x0) 17:42:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x1ff, 0x1, 0x1000}) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet6(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0xa, 0x4e21, 0x7c, @private1, 0x3}, 0x1c, &(0x7f0000000100), 0x0, &(0x7f0000000340)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @rthdrdstopts={{0xc0, 0x29, 0x37, {0x84, 0x14, '\x00', [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x28, {0x1, 0x8, 0x2, 0x515d, [0x3f807c8, 0x8000, 0x80000000, 0x1]}}, @generic={0x4, 0x69, "fe57ec87651d06a59a0ab10d696e5771f51d04df11b2051a17377f9a86e693a228b95c48848e7085c553ce86f817567ef8ff6091a7f52f957d02522d219cccec415ebac0c56a2700235df16fe3cf54843089850fa05e9b3dd6ca9d377f2d2eb0c11a2a5e0b70b96766"}, @jumbo]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xfffff554}}], 0xf0}, 0x804) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000000)="0183ae40f3fdac402b01fa055e4299bd37dddcc8", 0x14}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @private}}}], 0x20}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000080)={@mcast1, r3}, 0x14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x200000, 0x108) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r4, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 17:42:47 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:42:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20a0110080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 17:43:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8}}], 0x1, 0x0) 17:43:01 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:01 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:43:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r3 = creat(0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r4, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, 0x0, 0x0, {r3}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:43:01 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x14004004}, 0xc, &(0x7f0000001300)={&(0x7f0000001240)={0xa0, 0x12, 0x8, 0x70bd26, 0x25dfdbfb, {0x2}, [@nested={0x85, 0x7f, 0x0, 0x1, [@typed={0x8, 0x85, 0x0, 0x0, @uid=r0}, @generic="14f1f80e0a162c5d51e433392749cec1785a73531b85f64e1f64ab17ff15b39b551324500bc158f39b8af8e8c38dcca95b064ca77cf50a96d46d9d278d91e0f1eb813a076d10f609281fa8e99bb7fe11e46cce597cab3d57217f3b1763cb59ef5b30be606365d713f079b8082ae3dd4e51eeea764ed89012e6"]}, @typed={0x4, 0x8a}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r1, &(0x7f00000011c0)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/250, 0xfa}, {&(0x7f0000001140)=""/72, 0x48}], 0x3) 17:43:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20a1110080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480}}], 0x1, 0x0) 17:43:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20e11b0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/28, 0x1c}], 0x1) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000040)=0x8001) 17:43:01 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:43:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}}], 0x1, 0x0) 17:43:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r3 = creat(0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r4, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, 0x0, 0x0, {r3}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:43:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000200080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0xa) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000dc0)={0x0, 0xffffffffffffffff, 0xdf, 0x5, @scatter={0x3, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000a00)=""/200, 0xc8}, {&(0x7f0000000880)=""/143, 0x8f}, {&(0x7f0000000b00)=""/57, 0x39}]}, &(0x7f0000000b80)="6e756192052322f00eb52417c53729e99977b41d7a9c7d34db76b3924d48df362491ef0583afb8ca87ebb0a5c33c222d8959385574c35f606b406c225c2409769c1f80539c3b9fdf577ff1d4634cb262384367c8c64d9e107ee9f874b60decc0d3bedf869e08f2974f84e068ec6ba45bb62c5a52d5689438244f1c5d9a6da7c327f1f17275bc4e213fe7c337bc8a833da409b1443e3dd8727cb373dc91ec79d4974d5045490f1414b3bd8fb7b432ce69b4ece7d4e14c081309ce5f5acd0712f93bbb88ee469ca37b44a2df09b6cc98f5b62ca3b88caac75f73aea07463c5bf", &(0x7f0000000c80)=""/255, 0x1f, 0x10002, 0x2, &(0x7f0000000d80)}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105042, 0x1) r2 = openat(r1, 0x0, 0x100, 0x2) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000700)={0x0, 0xfffffffffffffffb, 0x9e, 0x4, @scatter={0x6, 0x0, &(0x7f0000000800)=[{&(0x7f0000000080)=""/83, 0x53}, {&(0x7f00000001c0)=""/254, 0xfe}, {&(0x7f0000000100)=""/123, 0x7b}, {&(0x7f0000000340)=""/224, 0xe0}, {&(0x7f00000002c0)=""/55, 0x37}, {&(0x7f0000000440)=""/55, 0x37}]}, &(0x7f0000000500)="2c2cb986edb866f8f3770fcb404b8bdd612cb21abe49358a5b2dbe099600d6cfb00b7ad29edddd704a67e9a83c14897febc3876233a1dddf7b3c51c06ce9bf1da321a7836dd77fdc48ead3a9e4dff6bccb0d92dee81fece4a86ab1e148e18b41ec36b3d8445aeefbde7545869d20c402396a916e78c07075612aa173d71a6e636c50af1ee2848ff3c3240e8c55e0193e2a97cae7f14d92143dcc961a2327", &(0x7f00000005c0)=""/210, 0x9, 0x20, 0x0, &(0x7f00000006c0)}) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r5, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r6, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f00000009c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x20, 0x3, 0x6, 0x401, 0x0, 0x0, {0x5, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000080}, 0x880) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x8010, r6, 0x6cdb7000) fcntl$getownex(r0, 0x10, &(0x7f0000000780)={0x0, 0x0}) fcntl$lock(r4, 0x6, &(0x7f00000007c0)={0x1, 0x3, 0x1, 0x800, r7}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) memfd_create(&(0x7f0000000480)='%&\x00', 0x2) 17:43:15 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:43:15 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:15 executing program 3: getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000040)=0x8) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x5, 0x4) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) socket$inet6_udplite(0xa, 0x2, 0x88) 17:43:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r3 = creat(0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r4, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, 0x0, 0x0, {r3}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:43:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x2}}], 0x7ffff000, 0x0) 17:43:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2010200080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:15 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}}], 0x1, 0x0) 17:43:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20d62a0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:15 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}}], 0x1, 0x0) 17:43:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20002e0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:15 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, 0x0) 17:43:15 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}}], 0x1, 0x0) 17:43:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0], 0x3, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:43:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20003f0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:15 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, 0x0) 17:43:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}}], 0x1, 0x0) 17:43:29 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x1fffffffffffffc, 0x20800) readv(r0, &(0x7f0000000180)=[{&(0x7f00000002c0)=""/24, 0x18}, {&(0x7f0000001440)=""/120, 0x78}], 0x2) r1 = open(&(0x7f0000000040)='./file0\x00', 0x2401, 0x7) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x6, 0x5}}, './file0\x00'}) ioctl$SG_IO(r2, 0x2285, &(0x7f0000001340)={0x53, 0x0, 0x1000, 0x62, @buffer={0x0, 0xa2, &(0x7f00000001c0)=""/162}, &(0x7f0000000340)="49c4670c1b60d7a3afa05403c6043f5e1549e6e1081462ebc585d3ac1bf07f63d7fe43402d62c97d34d8a4b7ecb1471c92ee3eb9d82b73edd34cb28726a6193ba90dc3b4b9418c146a1b5541a3436d101be4a301e206e199a251da9a7e7d265bd3ae1291b086aeb6348e57d4ccc0bbe3519f068ae3597449195bc67ce2900ef386355852a58bd573186dec8806e481b7de30ffccd68c070ad9575bba5fce6d131f2b5a5966d95aa4e9dfa0831017307dc08e8aa6d7269731e722fd4f7582f3e2b90f9aaf832f8f3f6c597196aa291f9c7c43e4e0fd994d76b79a70e1839a33f5c4c8c0a740769355d4d7bc465420915bc98609a79448bb5de725236c09881a30acc9a8bf12e699e6f218cdc0f99325d45898e6a6f3df98932d33ddf80c77487d9ceebb63947cf0f3d73e5a6bf96c35c972ec13f7febd1a7db0024259a4d48629689a024788378541f4e646ed42ae9460d84d880857994b43e002110b6d46fcfabae34317af837b445e6132b39a7a1351a7da32150e728ff2b7549da5847aae394dadf37e7608ad037abfcc6bf4c199dbcae5eee0107296959eb63d0888a578a223852eb684f04bcecdcf5988840a6f2c21e5ab31e3c0a253ef47104a2e645a287795e44d9df1ed7bebe662315181b660a38f259c4abd70e54b87eaf4855ce42dab3b654cd0413b7be9d7828a311c1ee01b43b8e76e961794bf3256e4724e31671be9727f9902f3bc2cac416d09777eca69f00c6b2df52ee8e2eda3768bfad4c9d8e1158e20074a80a1d67310623cee722ec4443a823242daf04ad49a75b62dc93bc9fc7b4a6f389a4466df7021fe18bb9a045dcc83d4bcf74b8deee8a0a14bde243f59a3692e3cfbe33405d70faca41243a1c44c2b116e41ca320e4da31adeeb50eb1a5f78d8f0c4cb5c0c8957cc9640288b67cca9eaf6814f2c46f2120efd43e88e99a7219c8600b0f3f7e14cf5b69487c78611bd6589ee1fa86ad806aa6543db34765bb89177d7e1471bdc0aea47abc87d20c8a7123b06d6b16244c260743d96fce1cb2820318853380ff1d80614c35dab073bd8d74c14d34492e1589f2f3d0c769c1ec0c83b017460b567fca3cbf2f6a68f4aa53134dbdf2afcb6f0fc5a37d904a08f9abc349b4253834da0aa96510cbcc212276d7e011a12b7f6ab9532b33aef6b84b1158816b1ad9128bb0712f750447090c306cc1fbf68d2e8f93b2fc48443c46fb21dbbaf0f194de87cc675a3770ae64d8201c2692ec02d124e582a4001ff0459c81c05467f249d08bad9e350d863e2191d9255a1c70db5b05edef6ffdb2ad3ef042f2ceb68951a89a1a76ed6907196f0406ddf6703c1fe642748f07078cbdf359539aae750525b04531afb0d1d0d4a85ce48842f2b7feca057b9239459bcfb96d05515b5c6a21d57065c3b3e2284dcf13dbeb5cf3e9040989651a938488c628c2c24a61ae42ccd16ebc8cc5123b7a880df631c2a4884aae4cb56cc4288dbf42d3c93ac1fc2415b4d38a75dfec6ffa1ea4d0ba280222c4709aa84d8428c7109935462e967d99c9ce813c9764ef6f2d6da1bc9aa474808920476ed6f2de0c2c40a93b7c3f9cc00d5dc60770598b590aef165e1059e9cb28fd9e2518f4e858c980654cd81643fa1d1904e3cca5805453a878c0af7f59154be13bee7a31e1ad4de2d88562d9a07a67ed7af7699900439f657c4c0267878567ebb2aec859215ea14001f7c68c39c09980e11cc5b34123c170b47047a741a5ea0fe1e31054cf9386dc25dbf0c4f8b3708446ceef94b20c088a481c7d664e20d953065039f24ccbb2cfe8ec4bf65c336728c8e4ce53000cf9d1ff2b512c5c24e05d4c0510ca78599136012573afe726461b5ce120294c0a8a39b3f779a83d124861eaeace4f3faa8cbc90b7f93f5b8321d2010be4835ed94ade16aa077bcab6c7df488420782c4931197a357ca1ea8fe6f8ea741df65d4700d6a3cc792a223c8b7c6d8baafdf9d561f49ae997c47f120ff308479a39c0b489ec074d2cf9b76f7977d2581ef054870caeb9d1421a9a3227c7a1ad0dff3638a65a2345476ec02d98e7712de3b1dd3c8a9a974806f3591c63ffa82a08ffc9dfc379701e1e69684c91be7663b0c5c331796e0274c4afa98b7665ad80282deafdb518a55b260d35c41e7672262edd476f3b08cd3adb23ffafd9636d7d4d9309563ac6d6b6e2bc326c19a99d57ebd5dfbdf0433599c9d62171d5358eebc5f29b4cf1fe2a89686667d5f04b86ef1a75b50bb3e74f0542d6026ef7c8c7beaeb0678d6990988c04fd286f9cab471b9f690c25021d90610ba5ce9798269bd54942a3a6d13f0fabf8212a253e23be473846741c89d49fde8e754e47f16ef6d36b876df3e416c5550199e743929a9b45cbb2f0e14dbf3235e39a83712dfaa469ccfe6f71e4be6b4475b6ab13526f36789febfb62795f859f74d42edd8b5efef1777f1ad82ba0e8b7a1e0ce821a0214c12ee158936028c648345263756596a24319412a26d9e22eb1e42db4f57ca25427b209cb28e09dae1824d6779db1897ddbbf3f20e6d4b754df9252a9678b9c1235d67ef1aaa63cbead332c8ccbfd0ab6530b2d09a13ea4c37d411b7c1b81c718af409586222927ca1b5e5119d86a371a6683dc71cd960bf3bc7b9106dbb1fe2901b0eb8c2a4d428cd48261208f885580157e9f65f606f138f19d67caaef4d43bbc9fb19c44dce254835bef4770408b04ee708440fe563ddc1986cb9796a9dc59b5229b31eaa084cece946d2d192593968fd92a9c4bcf645939a1be515b50768ed4e1f937909b6ee3d7e65046821c3ce3546efd22fc391d1c0ec9a710ba49e8ea99ff71447cdcc68a707c20f2ce751249aefaef95d28f6775e341fbb1dcfd37feb1436dc826d593b360cc7e5fecbd2e5f6216e832718303d2f576e4f4108532b7519d8c7bbb717bff5bd2fb7f1d5733b62b35904eb524265acd16ab691e8a636e7728ce6e730f4129981cfaa6f2712f4740cd2b934b4ade72f0289425385edc5d3943db4bbcd66346ded07b40e04f2f6b66a4ba41c6e124097f90b4dd4a3925ad6bfb4e5d66493c9b02d7cee99fe473b001af3b0e9e33077bbce9b3b537bbd77a2f54359004e5a5431eef992a9f6f719af8758a289b8b4910c3bbbcccb9b46cbf35f8d54f9e596fc554df7055e971fc4bc817959018cfab0aebf9108574b5ca841b9ae309bcd0d8ebaa8417ef022930cc56215d653883a21b9c1a6364956910681561fbd0d381b1ad597dc57cefd7a1a1cbafa2dfbce530d829277791a25be396ef5e125aabc118a357d9a5c28f7f74243ec0a864975c5a23914c917d891f7c04d50c8e33beedea7e9f2f7a20ceb53cb677b842f548652df31dc5d1e013a4d547094a885473d8f8e697c6a031d6c1ccb81c7874b210642b32e93189d2dc7c615531d5a664f7f39fc13c9c2d70ca44ff78b898f4ef9c1b1ca9ec1e43da6b670d230097256d37b60d12ca0e039c1f7ec64dfe0bc5f32610e951cebff674ec8d88834be3f1b475ee082d9324dc4c551f34722dc56edb469f826152ccaa2f4acdbda8eb89b3ea7cfb142e56cb4080d60fcab8f49febd16feaace272662bae98ee72f5eef1534815cd4260aff9477c8a38ff9031300e37a047daeb5f17df20dd56568683b4e7337b1bc918be896df9adef3f3805ec810e83c8dd276cfeea500c686a1e13a01515316de6ca9fb24f5ff29b692affc4a250b32663cdb09ae1571df6b3edf9d58079cadc188ecf8c15ce9d31f4375df18cf9d787bbee5d8ccab0b709792e45a8e420238c537715e4a0a72a00228c9ad2246b991e5e6cd7d7f53c0b3da376a176f777eedd34a4b6d6b5465b8abe4de02c3a60a80628fd3b5e233beafbdc0f81d94782c99967b83239f0d6b40bf8ef380625b89599e787be57f216857abca07d7c22c524733a853911a64a03ce8dbf482698422d7466c1081a70884cad79ea0d2a3ff0b7053dcbd20b90bb0e1a797b6b7919fec35ede161c6cb5f130e6e82589068fac81000d3fcacf6dc892c9a22eae29550ff31626a511df1ed2bf78635ad2e8e63def5ca487ab74edec893d34b04f71154da8d38972e50316d4b912f37e8ceba575d264c3cd4b8607c12ecf987f9d9cb53d5efba441b6372dc81a80d8e385604c38caf02b03b7f34f4a303b3da7eefe0d7b7c7daff4b3a75229b6a614f7991905d349738cfd9c51f8c3f137e42b2ef46c3fdd1cd0426a98b6d8eb20c1c7887880ae49a0ecc0c3eb9009fdb7a3e887f68b67e6e4dc40e9cc0ccd4325613ac4de6b2dbc356b2413ebd8cc6b74e37539625bbed0311d16a38cfc01a100e18e567d83cff82a9730df0ba69ff712eb77e5d32d56019056fc8bc8708d38969db55f6d2d8fecdb7c714af8b90b10656915fae7e1c63c13616ffc64eea88650629da85203d1fb07348d70526fe4e27a2167faceba46189c3f26fdc72376cb0c3313a192c92b1aeb44396c2c8fa10db8a324ae9b2345bdbd5012d52aa6d52785562c3484c02059281462db1430cbb759c8dec0167edff1a817980292534bb2aa595147f4134ee963484fa6f30754c51fc104cc3b69c8f9bd414d887da916caa525ddf0bf7e371be5abafde8057540adf682fb915626835f58f4a4d8eac570366d5f9816c26bee44a6be2258a6336dd75a1fc1ce939f43c1a92330c0927d40a0eeb94ec30da4a8c04e5d3ed58c3479c6f4ec1ba80ee3bd62127d29f0237919bc3227d413d55f6ef695899267c9f34992185c5cb8525b329c4533ac94d1f4e75cd05d6822dbd064976a89a8192aee267041fbab440a4315661d83c97f0eaac925c543e922abf714b565801228e72318134779e8ccb919c89e90150a6222db097f5ee3c3b3e37b445cafd1ad242e349aed9b3f4559994c3368fdd2641e9f6e0442aa4abc7b6446e2ca62fc30ce07edc88e75a98d25d41bc2262e62d52cdd7c067b88e5df061b14c3dbd7a9cc3904ed7e66324c37ab5ecdd22c03751e6fc5861e4e3b2fd90055e3d586109373d9cd8dc82410ec4e79ee7933c943f2f9987b429dce27d3b1522cc8377c9183e9504dd190bee3a1a895860b7576c57506ca421ae685e26d73a3b3f27dcb2e1ebbe2f0c35494fbbaa63dc954cebcbba32552349e269fa6c4a9426a2d1f884f8771692197ab369324f48eddc8d37568d4c277da45fe3589266384800ac5bfda2b7484e80d1cf7dd44a11bf80c111a242d3d9a31bbac82ef9c70baa4b7e78065a4c495f3d3e26011be9241cf473c7b72ae98fb0eb699a11675c56697b8fda7b0d4d88a1ded96a75829f6a820c6cfa6bcd1d8a205749e8bc0b0c3b9b885ca7669c5259d27ed5891aed3ce923a77f098dd05fb76a75766d3c8f59584ae645f54723026617c80fbbadc273041ed54fd57ff90bd990e88b76db9256c8faedc10674e3e622a0dc79399df739668eebb630c906a0ac3e2b97ce31cc3aca078f8cacf30c25d0b3f83c8dd08ddfecaca3752d6c0d3f7a5a760f9c2f394d069a9b898747adefccc85a17580bf67933de2aeefc9ac7f4803e761389af0e2e70232868921d3a7a94eab530bf321a4cf71673e6cd83c031b98fd02ca4e1eb258767a6703a6a4b695068e7a4ec4de4c55c216d7542cb312399589db30b3be79e06d1134dea7051ac8c2ea3527da9dc2bacfa9ac1f1b2b7a53e635e6135bea424ca19f357b3527cffac0c51e88e505a97d7cd281245a8c73274779306db7747286b20d7fd39f6a8a2929aa424401130e4f2ed0e2cc5c26d74fc6d080c2a60498a39487d0", &(0x7f0000000100)=""/83, 0x100, 0x10026, 0x3, &(0x7f0000000280)}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000001000000180000006e9d6ef5af394443c26de2474fab00", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x10010, 0xffffffffffffffff, 0x8000000) 17:43:29 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}}], 0x7ffff000, 0x0) 17:43:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000400080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0], 0x3, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:43:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:29 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:29 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, 0x0) 17:43:29 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000040)="b7b941503c4a43f7bf1b89403e578fd9f96d9f2b9ce5f800a09fcc57f220c37d54ee5b4c40d326b939bfbecd21d07cfa160cb10c1d5b607aa65afc8f09b2c059989adaf5a506d657a1ed1046b3", 0x4d}, {&(0x7f00000000c0)="a2174bcba5d329c5fcd97df7c37be589f9234d083ea4369cc3069954d5c5fb4d8f7025487206", 0x26}, {&(0x7f0000000100)="77abd88b30421bd16938af6474bdbb2770ac28dc5ef0c5cb846b62c140bc3fb8d7cdc3ded582540a35989d6230b6aa0be0c54b080a027fda6320ddfc253ec3fd81e1205a5acef5a858867d55db8290c65ae4818fcd8e791eb037101ca58a", 0x5e}], 0x3) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000480080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0x1, 0x0) 17:43:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20004c0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}], 0x1, 0x0) 17:43:29 executing program 3: ioctl$PTP_PIN_SETFUNC2(0xffffffffffffffff, 0x40603d10, &(0x7f0000000040)={'\x00', 0x7, 0x2, 0xf05}) r0 = syz_open_dev$sg(&(0x7f0000000000), 0xff, 0x200300) ioctl$AUTOFS_IOC_READY(r0, 0x9360, 0x100000001) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000600080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:29 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, 0x0) 17:43:29 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000040)) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000080)=""/22, 0x16}], 0x1) 17:43:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0], 0x3, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:43:43 executing program 5: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}], 0x1, 0x0) 17:43:43 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, 0x0, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:43:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000680080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:43 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x26002, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)={{0xcc, 0xd7, 0x0, 0x365, 0x3c6, 0x8000, 0x2e0, 0x200}, "3030f5ff698203d5307e133dbcf0f552e6b293ea8c8531397c89143fb0d0010f726533baf00b15738fea586e12f9d61ba446c34961e6dc10c1ecad85149afcec7f378ffd7eaba8ddb105d723d5d89c59dbcb10cb34d5b886a938c6bd6570bc6dc3da85dea0980f8df3d8896d3a9f5e58cb4610d22e4e5b70fd317e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x69b) write$vga_arbiter(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="bd65636f64657320696f00"], 0xb) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) writev(r2, &(0x7f0000000100)=[{&(0x7f00000001c0)="9042de7bb05356d65215dd5526601728c5f064fcb67f577595b9e556c96b1c82ea579e4f5987d7d13839dbfd94ad1aa090e763939627a76c4b5631060e442e4e16214d7914487dc5ab6924d9fc82700804ee3f57d4fcff025ddc744fb345f1106c7c27e71b76c8cf4547d03366892f7cf478705e7228ded1566f3aa21b290ab7ed76e939bb298cd78aed1963695a3a6e2a5c31b20a6462c70e78f811e63092f5c08a015b8e0ea0c8ddf4f80ba5fb864dfc8d3edc9cbaf2360e07cc30584551dc3375ae28fb1def4b0414c9710cc573efc12bd723c3c0070a", 0xd8}, {&(0x7f0000000140)="66272ac0857d43c215216e75da6fc2f2b7fd622347ec0cb90df22b9f4175b5cc", 0x20}], 0x2) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, 0x0], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:43:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x4}}], 0x7ffff000, 0x0) 17:43:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20006c0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:43 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x10f, 0x0) readv(r0, &(0x7f00000000c0), 0x0) 17:43:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}], 0x1, 0x0) 17:43:43 executing program 5: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:44 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}}], 0x7ffff000, 0x0) 17:43:44 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x3a1102, 0x0) r3 = openat(r1, 0x0, 0x100, 0x2) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="260000006b380000667f00006cc38b516271e2964488a3b54d5e800a25ca320eca1d3c96fcda87261d574b93a32bfba84f76"]) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x184}, 0x18) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:44 executing program 5: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000740080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:58 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}}], 0x7ffff000, 0x0) 17:43:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x8}}], 0x7ffff000, 0x0) 17:43:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20007a0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, 0x0], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:43:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) syz_io_uring_setup(0x5f13, &(0x7f0000000040)={0x0, 0xa7, 0x0, 0x2, 0x3a2}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000001c0)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x3, &(0x7f0000000140)={0x0, 0x3938700}, 0x1, 0x1, 0x1, {0x0, r2}}, 0x7) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:58 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, 0x0, 0x0) 17:43:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) setresuid(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:43:58 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e00}}], 0x1, 0x0) 17:43:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2011a00080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:43:58 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, 0x0, 0x0) 17:43:58 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004}}], 0x1, 0x0) 17:43:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/98, 0x62}, {&(0x7f00000000c0)=""/24, 0x18}, {&(0x7f0000002340)=""/145, 0x91}, {&(0x7f00000001c0)=""/59, 0x3b}, {&(0x7f0000000200)=""/164, 0xa4}, {&(0x7f0000001340)=""/4096, 0x1000}], 0x6) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000340)={0x0, 0x7d}) 17:43:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, 0x0], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:43:58 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, 0x0, 0x0) 17:44:13 executing program 2: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:44:13 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe}}], 0x1, 0x0) 17:44:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, 0x0], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:44:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300), 0x0) 17:44:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2011a10080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:44:13 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) r1 = socket$inet(0x2, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(r3, 0x0, 0x100, 0x2) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) umount2(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$IPT_SO_GET_ENTRIES(r5, 0x0, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000007e000000ab3b454f13d46d6c60d84ae49246c70cf7f4cacfc026d1e952a35af55ff84b8976472e39e81f8576ef5c65198f91bef1c3a709f413bfb6dca78a29de9c669e980098b1c5edafff39012bf1da2acb9214ea0011e2ee19238e871af1dd50f52e1d6f7e6d314398cf9a5f21d605112fd7bbbda945702ebc0e47ebbf24d81b1ab12d357cf96a5d8b"], &(0x7f0000000100)=0xa2) r6 = fsmount(r2, 0x1, 0x9) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x402000, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r7, 0x227b, &(0x7f0000000240)=0x1) setsockopt$IP_VS_SO_SET_EDITDEST(r6, 0x0, 0x489, &(0x7f00000001c0)={{0x6c, @local, 0x4e21, 0x2, 'lc\x00', 0x3, 0x9, 0x16}, {@private=0xa010100, 0x4e22, 0x2000, 0x1, 0x6, 0x4}}, 0x44) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x167) r9 = openat(r8, 0x0, 0x100, 0x2) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001540)={0x4, 0x80, 0x6, 0x9, 0x8, 0x1, 0x0, 0x65, 0x200, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x1e08b, 0x0, 0x7fffffff, 0x5, 0x1, 0x9, 0x7, 0x0, 0xe1d0, 0x0, 0x1}, 0x0, 0xf, r5, 0x3) sendfile(r9, r10, 0x0, 0x100000001) sendmsg$nl_generic(r10, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)={0x1118, 0x31, 0x20, 0x70bd2a, 0x25dfdbff, {0x11}, [@generic="6c2ba996db5f8ed1aa91e3c1bb64aaec4fabe7ca01a699907d244d10586037e0b8676cd0dcfefd0644d026063b5d53814fe7e47d7455324943852e212de8e7108751feaffa1b91ab37be40dba8af599124a860e957d86ecdcf63ce8d93cf1255d93882758f67acaaf3a547c3ce4f02f188f2b7860fa6dccfb8f11b674b84b22c66cef0d2903f245f82e290d9e2de67f482f6075c4cd8a9cd3941b5be7058e4abe3510fc567638c6525c2afe45e1f4b9176db8e07019897651bca0cf6fc310ea80451fa46d6c9184dc5b72d476d11b16bd2adc782cf65b8d858b7f96056d8bcc037eedee86cf71a835fb96e852dbc8c27c726", @typed={0x1004, 0x78, 0x0, 0x0, @binary="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"}, @generic="d5c4390c5eea0b27f290ef"]}, 0x1118}, 0x1, 0x0, 0x0, 0x840}, 0x20000092) 17:44:13 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, r4], 0x3, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:44:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x9}}], 0x7ffff000, 0x0) 17:44:13 executing program 2: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:44:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="202ad60080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:44:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300), 0x0) 17:44:13 executing program 2: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:44:13 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe}}], 0x1, 0x0) 17:44:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0], 0x3, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:44:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, 0x0, 0x0) 17:44:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="201be10080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:44:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300), 0x0) 17:44:29 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x11}}], 0x7ffff000, 0x0) 17:44:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803}}], 0x1, 0x0) 17:44:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="200fff0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:44:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), 0x0, &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:44:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, r4], 0x3, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:44:29 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, 0x0, 0x0) 17:44:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{0x0}], 0x1) 17:44:29 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) openat$nvram(0xffffffffffffff9c, &(0x7f0000001800), 0x18e00, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) r2 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs2/binder-control\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000052c00)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053000)={0x376, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x6, "5c83c9bf8af498"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004c140)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c340)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}], 0xad, "7e9ac7272717f4"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000469c0)={0x0}) r6 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000052c00)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053000)={0x376, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x6, "5c83c9bf8af498"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f000004c140)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c340)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {0x0, r8}], 0xad, "7e9ac7272717f4"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000046bc0)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x2, "3d58e2d213cd38"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000047bc0)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "70163760f68269"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000048bc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {r5}, {}, {r7}, {r9}, {0x0, r10}], 0x1, "9d73ec3717fab7"}) fcntl$dupfd(r0, 0x0, r1) 17:44:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{0x0}], 0x1) 17:44:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000020080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:44:29 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, 0x0, 0x0) 17:44:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401}}], 0x1, 0x0) 17:44:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{0x0}], 0x1) 17:44:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000030080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:44:45 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x30}}], 0x7ffff000, 0x0) 17:44:45 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00}}], 0x1, 0x0) 17:44:45 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x100000, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:44:45 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) (fail_nth: 1) 17:44:45 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300), 0x0) 17:44:45 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), 0x0, &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:44:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000040080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:44:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, r4], 0x3, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:44:45 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:44:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000050080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:44:45 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300), 0x0) 17:44:45 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80}}], 0x1, 0x0) 17:44:45 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0xa) 17:44:45 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0x2000018c}], 0x1) 17:44:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, 0x0, r3], 0x3, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:44:45 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, r4], 0x3, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:45:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000060080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:45:01 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0x7ffff000}], 0x1) 17:45:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x31}}], 0x7ffff000, 0x0) 17:45:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, 0x0, r3], 0x3, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:45:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0}}], 0x1, 0x0) 17:45:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300), 0x0) 17:45:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @broadcast}, 0xc) 17:45:01 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 1) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 2341.339894] FAULT_INJECTION: forcing a failure. [ 2341.339894] name failslab, interval 1, probability 0, space 0, times 0 [ 2341.341814] CPU: 1 PID: 15930 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2341.342815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2341.344045] Call Trace: [ 2341.344446] dump_stack+0x107/0x167 [ 2341.344994] should_fail.cold+0x5/0xa [ 2341.345567] ? getname_flags.part.0+0x50/0x4f0 [ 2341.346248] should_failslab+0x5/0x20 [ 2341.346808] kmem_cache_alloc+0x5b/0x310 [ 2341.347407] getname_flags.part.0+0x50/0x4f0 [ 2341.348062] getname_flags+0x9a/0xe0 [ 2341.348604] do_mkdirat+0x8f/0x2b0 [ 2341.349122] ? user_path_create+0xf0/0xf0 [ 2341.349743] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2341.350508] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2341.351273] do_syscall_64+0x33/0x40 [ 2341.351812] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2341.352544] RIP: 0033:0x7f466d9b7b19 [ 2341.353086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2341.355718] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2341.356816] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2341.357838] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2341.358875] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2341.359900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2341.360919] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:45:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00}}], 0x1, 0x0) 17:45:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{0x0}], 0x1) 17:45:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100), &(0x7f0000000140)={'U-', 0x7b8}, 0x16, 0x1) write(r0, &(0x7f00000000c0)="3619c43a3f1c64b08d92982c5a8521", 0xf) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x2000, 0x155) 17:45:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000070080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:45:01 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x8) 17:45:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{0x0}], 0x1) 17:45:01 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 2) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:45:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20480}}], 0x1, 0x0) 17:45:01 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x300) 17:45:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000080080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2341.609843] FAULT_INJECTION: forcing a failure. [ 2341.609843] name failslab, interval 1, probability 0, space 0, times 0 [ 2341.611871] CPU: 0 PID: 15956 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2341.612876] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2341.614075] Call Trace: [ 2341.614464] dump_stack+0x107/0x167 [ 2341.614996] should_fail.cold+0x5/0xa [ 2341.615564] ? create_object.isra.0+0x3a/0xa20 [ 2341.616225] ? create_object.isra.0+0x3a/0xa20 [ 2341.616888] should_failslab+0x5/0x20 [ 2341.617438] kmem_cache_alloc+0x5b/0x310 [ 2341.618025] ? getname_flags.part.0+0x50/0x4f0 [ 2341.618690] create_object.isra.0+0x3a/0xa20 [ 2341.619349] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2341.620087] kmem_cache_alloc+0x159/0x310 [ 2341.620698] getname_flags.part.0+0x50/0x4f0 [ 2341.621355] getname_flags+0x9a/0xe0 [ 2341.621908] do_mkdirat+0x8f/0x2b0 [ 2341.622436] ? user_path_create+0xf0/0xf0 [ 2341.623070] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2341.623856] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2341.624611] do_syscall_64+0x33/0x40 [ 2341.625167] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2341.625923] RIP: 0033:0x7f466d9b7b19 [ 2341.626463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2341.629121] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2341.630215] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2341.631246] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2341.632278] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2341.633303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2341.634332] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:45:16 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 3) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:45:16 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{0x0}], 0x1) 17:45:17 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0xffffffffffffffff, 0x51, 0x1, @scatter={0x1, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/9, 0x9}]}, &(0x7f0000000140)="6520973a8a2e765b38323772fccd990d9e4f1121f41d56c201117643de81770fa96b88e4f014f668f64e21a4e41c1ade456bf1acabd845fbcfaa6beb4cd5fb79922baa72f0309b3549af06a3ebbaf91a1d", &(0x7f00000001c0)=""/97, 0x3, 0x10024, 0x2, &(0x7f0000000240)}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/12, 0xc}], 0x1) 17:45:17 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x60}}], 0x7ffff000, 0x0) 17:45:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, 0x0, r3], 0x3, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:45:17 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) close(r0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) lseek(r1, 0x3, 0x3) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r3 = fsmount(0xffffffffffffffff, 0x0, 0x72) pwrite64(r3, &(0x7f0000000040)="dc4173187b77ca938a355f737a00fef086ecc007919df1db29e89beacede71ffe790e09276197643901b8b479334005a36be66c17f9f6e0503803950184c4e823368a465a35e18841907a966686940b059d85f85bd35006d3b3852feca62798572bb175f4cf96db42cc13dfe1bff694373892c8b58", 0x75, 0x4) 17:45:17 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}}], 0x1, 0x0) 17:45:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000090080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2357.148300] FAULT_INJECTION: forcing a failure. [ 2357.148300] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2357.149799] CPU: 0 PID: 15971 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2357.150463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2357.151249] Call Trace: [ 2357.151524] dump_stack+0x107/0x167 [ 2357.151772] scsi_io_completion_action: 59 callbacks suppressed [ 2357.151825] sd 0:0:0:0: [sg0] tag#0 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 2357.151887] should_fail.cold+0x5/0xa [ 2357.152904] sd 0:0:0:0: [sg0] tag#0 CDB: opcode=0x65 (reserved) [ 2357.153672] strncpy_from_user+0x34/0x470 [ 2357.153691] getname_flags.part.0+0x95/0x4f0 [ 2357.154244] sd 0:0:0:0: [sg0] tag#0 CDB[00]: 65 20 97 3a 8a 2e 76 5b 38 32 37 72 fc cd 99 0d [ 2357.154830] getname_flags+0x9a/0xe0 [ 2357.154843] do_mkdirat+0x8f/0x2b0 [ 2357.154858] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 2357.154874] ? user_path_create+0xf0/0xf0 [ 2357.155482] sd 0:0:0:0: [sg0] tag#0 CDB[10]: 9e 4f 11 21 f4 1d 56 c2 01 11 76 43 de 81 77 0f [ 2357.155894] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2357.155907] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2357.155922] do_syscall_64+0x33/0x40 [ 2357.157174] sd 0:0:0:0: [sg0] tag#0 CDB[20]: a9 6b 88 e4 f0 14 f6 68 f6 4e 21 a4 e4 1c 1a de [ 2357.157529] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2357.158055] sd 0:0:0:0: [sg0] tag#0 CDB[30]: 45 6b f1 ac ab d8 45 fb cf aa 6b eb 4c d5 fb 79 [ 2357.158544] RIP: 0033:0x7f466d9b7b19 [ 2357.159153] sd 0:0:0:0: [sg0] tag#0 CDB[40]: 92 2b aa 72 f0 30 9b 35 49 af 06 a3 eb ba f9 1a [ 2357.159946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2357.159954] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2357.159976] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2357.160751] sd 0:0:0:0: [sg0] tag#0 CDB[50]: 1d [ 2357.161217] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2357.161230] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2357.169910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2357.170608] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 [ 2357.175539] sd 0:0:0:0: [sg0] tag#0 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 2357.176503] sd 0:0:0:0: [sg0] tag#0 CDB: opcode=0x65 (reserved) [ 2357.177109] sd 0:0:0:0: [sg0] tag#0 CDB[00]: 65 20 97 3a 8a 2e 76 5b 38 32 37 72 fc cd 99 0d [ 2357.177940] sd 0:0:0:0: [sg0] tag#0 CDB[10]: 9e 4f 11 21 f4 1d 56 c2 01 11 76 43 de 81 77 0f [ 2357.178779] sd 0:0:0:0: [sg0] tag#0 CDB[20]: a9 6b 88 e4 f0 14 f6 68 f6 4e 21 a4 e4 1c 1a de [ 2357.179628] sd 0:0:0:0: [sg0] tag#0 CDB[30]: 45 6b f1 ac ab d8 45 fb cf aa 6b eb 4c d5 fb 79 [ 2357.180421] sd 0:0:0:0: [sg0] tag#0 CDB[40]: 92 2b aa 72 f0 30 9b 35 49 af 06 a3 eb ba f9 1a [ 2357.181250] sd 0:0:0:0: [sg0] tag#0 CDB[50]: 1d 17:45:17 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) 17:45:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20000a0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:45:17 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x31}}], 0x7ffff000, 0x0) 17:45:17 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) setresuid(r4, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:45:17 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) 17:45:17 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}], 0x1, 0x0) 17:45:17 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 4) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:45:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20000b0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:45:17 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x221000) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:45:17 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}}], 0x1, 0x0) [ 2357.450081] FAULT_INJECTION: forcing a failure. [ 2357.450081] name failslab, interval 1, probability 0, space 0, times 0 [ 2357.452542] CPU: 1 PID: 16108 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2357.453589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2357.454843] Call Trace: [ 2357.455256] dump_stack+0x107/0x167 [ 2357.455786] should_fail.cold+0x5/0xa [ 2357.456368] ? __d_alloc+0x2a/0x990 [ 2357.456920] should_failslab+0x5/0x20 [ 2357.457502] kmem_cache_alloc+0x5b/0x310 [ 2357.458127] ? __d_lookup+0x3bf/0x760 [ 2357.458719] __d_alloc+0x2a/0x990 [ 2357.459270] d_alloc+0x46/0x1c0 [ 2357.459769] __lookup_hash+0xcc/0x190 [ 2357.460348] filename_create+0x186/0x4a0 [ 2357.460965] ? filename_parentat+0x570/0x570 [ 2357.461624] ? getname_flags.part.0+0x1dd/0x4f0 [ 2357.462327] do_mkdirat+0xa2/0x2b0 [ 2357.462868] ? user_path_create+0xf0/0xf0 [ 2357.463507] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2357.464293] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2357.465071] do_syscall_64+0x33/0x40 [ 2357.465635] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2357.466400] RIP: 0033:0x7f466d9b7b19 [ 2357.466963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2357.469698] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2357.470830] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2357.471895] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2357.472958] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2357.474024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2357.475086] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:45:33 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) fallocate(r1, 0x4, 0x0, 0x3) 17:45:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/99, 0x63}], 0x1, &(0x7f00000002c0)=[@cred={{0x1c}}], 0x20}, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) 17:45:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x1f4}}], 0x7ffff000, 0x0) 17:45:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, 0x0, r3], 0x3, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:45:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20000d0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:45:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}], 0x1, 0x0) 17:45:33 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 5) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:45:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, 0x0, 0x0, r3], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:45:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20000f0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2373.354510] FAULT_INJECTION: forcing a failure. [ 2373.354510] name failslab, interval 1, probability 0, space 0, times 0 [ 2373.356476] CPU: 0 PID: 16140 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2373.357488] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2373.358708] Call Trace: [ 2373.359104] dump_stack+0x107/0x167 [ 2373.359655] should_fail.cold+0x5/0xa [ 2373.360217] ? __d_alloc+0x2a/0x990 [ 2373.360758] should_failslab+0x5/0x20 [ 2373.361323] kmem_cache_alloc+0x5b/0x310 [ 2373.361922] ? __d_lookup+0x3bf/0x760 [ 2373.362479] __d_alloc+0x2a/0x990 [ 2373.363011] d_alloc+0x46/0x1c0 [ 2373.363507] __lookup_hash+0xcc/0x190 [ 2373.364080] filename_create+0x186/0x4a0 [ 2373.364679] ? filename_parentat+0x570/0x570 [ 2373.365329] ? getname_flags.part.0+0x1dd/0x4f0 [ 2373.366009] do_mkdirat+0xa2/0x2b0 [ 2373.366550] ? user_path_create+0xf0/0xf0 [ 2373.367166] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2373.367943] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2373.368693] do_syscall_64+0x33/0x40 [ 2373.369241] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2373.369989] RIP: 0033:0x7f466d9b7b19 [ 2373.370536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2373.373197] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2373.374328] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2373.375365] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2373.376412] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2373.377447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2373.378485] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:45:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}], 0x1, 0x0) 17:45:33 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0xffffffff, 0x20c00) readv(r0, &(0x7f00000011c0), 0x1) 17:45:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000110080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:45:48 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x301500, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000004c0)={0x0, 0xfffffffffffffffe, 0xbc, 0x80, @scatter={0x2, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/105, 0x69}, {&(0x7f00000001c0)=""/198, 0xc6}]}, &(0x7f0000000340)="5d1d607b6098b330cd1934e243662a9b21d4a31db98df5df38fe6fbe40f3235f4deda526fe830f90a6606addcf1e6828eec63f1b2568f105af6d725957826b20ab694a55a85672d339130dbad7bd5dcd26032fa9f2517ff6dde7d8d02c819ae4819d8eaff82228d1dcf31f278736912f7277a0df86e27be0cf9aba75f98ee74a6b1c590748365bc7ef0885aace92c812887c1efc4f7510e512b90781b4170a6e629bddd7ae631718e8ed47a9330bdec125708a569fdddc121911a132", &(0x7f0000000400)=""/171, 0x6000, 0x2, 0x0, &(0x7f0000000100)}) syz_open_dev$evdev(&(0x7f00000002c0), 0x50, 0x181002) [ 2388.279460] FAULT_INJECTION: forcing a failure. [ 2388.279460] name failslab, interval 1, probability 0, space 0, times 0 [ 2388.281098] CPU: 1 PID: 16163 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2388.281740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2388.282498] Call Trace: [ 2388.282750] dump_stack+0x107/0x167 [ 2388.283091] should_fail.cold+0x5/0xa [ 2388.283453] ? cgroup_mkdir+0x254/0xf50 [ 2388.283836] should_failslab+0x5/0x20 [ 2388.284189] __kmalloc+0x72/0x390 [ 2388.284517] cgroup_mkdir+0x254/0xf50 [ 2388.284879] ? cgroup_destroy_locked+0x710/0x710 [ 2388.285320] kernfs_iop_mkdir+0x14d/0x1e0 [ 2388.285708] vfs_mkdir+0x493/0x700 [ 2388.286048] do_mkdirat+0x150/0x2b0 [ 2388.286382] ? user_path_create+0xf0/0xf0 [ 2388.286771] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2388.287252] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2388.287741] do_syscall_64+0x33/0x40 [ 2388.288084] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2388.288555] RIP: 0033:0x7f466d9b7b19 [ 2388.288908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2388.290579] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2388.291277] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2388.291937] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2388.292596] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2388.293248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2388.293899] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:45:48 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x3, 0x141081) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="4e98da20fda4b8642c4e960fe45dd7bf8fcd2ab9e9963a21a2e1537aba904fda9f709c63d2a3cdc3ef502625ee99f952b671e102a18776bcc02e01d9b6f13f80f90c808b9e90bece0a3c5faf582ff8e1f30a99e6a494c4fe42ee30b9fe17099ce4ae0cc1e411bed219c6ed671a59a645b4291f360574", 0x76, 0x101}], 0x810000, &(0x7f0000000340)={[{@fat=@umask={'umask', 0x3d, 0xffffffff80000001}}, {@fat=@uid={'uid', 0x3d, r1}}, {@dots}], [{@subj_user={'subj_user', 0x3d, '/dev/sg#\x00'}}, {@subj_role={'subj_role', 0x3d, '@*@#&]'}}, {@uid_lt={'uid<', r2}}, {@obj_type={'obj_type', 0x3d, '/dev/sg#\x00'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/sg#\x00'}}, {@smackfsdef}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/sg#\x00'}}]}) setresuid(0x0, r1, 0x0) lremovexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'user.', '\xb6,:(\',\x00'}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:45:48 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}}], 0x1, 0x0) 17:45:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x300}}], 0x7ffff000, 0x0) 17:45:48 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) (fail_nth: 1) 17:45:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20002e0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:45:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, 0x0, 0x0, r3], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:45:48 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 6) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 2388.349638] FAT-fs (loop5): Unrecognized mount option "subj_user=/dev/sg#" or missing value 17:45:48 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}], 0x1, 0x0) 17:45:48 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 7) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:45:48 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) syz_open_dev$sg(&(0x7f0000000040), 0x6, 0x20400) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="8a8287e717bd648a37", 0x9}, {&(0x7f0000000100)="a24cbd2c47a8138d151fbf0ea08c3c6157d046db34779d2324d0fcfe712d74d4f0fab4f145fa", 0x26}, {&(0x7f0000000140)="95864d5e087ed892c004716649679129ef6dd1c43a375c8e049310b577638a0e5af4fd92891e115639bef8fcc4e36839fe1cdde62220317cbaab9966", 0x3c}, {&(0x7f00000001c0)="41f5a392420452832e332cd1016d66bfd666cb9239f0ac2249e48d6915edcecec7255d2dee2cc48f87d98f805c1e270378e3d6fab05f53f71ef641a08e057c73545062b148477e06cb2b88", 0x4b}, {&(0x7f0000000240)="20647e0f68b2170fd0860e90a90cb72a7c9d40b5cbb992100b", 0x19}], 0x5) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x408000, 0x0) 17:45:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000480080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:45:48 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:45:48 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/bus/event_source', 0x202000, 0x148) r4 = getpid() ioprio_get$pid(0x1, r4) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={r4, r1, r2}, 0xc) [ 2388.461394] FAULT_INJECTION: forcing a failure. [ 2388.461394] name failslab, interval 1, probability 0, space 0, times 0 [ 2388.462606] CPU: 1 PID: 16186 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2388.463205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2388.463925] Call Trace: [ 2388.464162] dump_stack+0x107/0x167 [ 2388.464479] should_fail.cold+0x5/0xa [ 2388.464809] ? create_object.isra.0+0x3a/0xa20 [ 2388.465201] should_failslab+0x5/0x20 [ 2388.465528] kmem_cache_alloc+0x5b/0x310 [ 2388.465886] create_object.isra.0+0x3a/0xa20 [ 2388.466261] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2388.466699] __kmalloc+0x16e/0x390 [ 2388.467017] cgroup_mkdir+0x254/0xf50 [ 2388.467351] ? cgroup_destroy_locked+0x710/0x710 [ 2388.467785] kernfs_iop_mkdir+0x14d/0x1e0 [ 2388.468148] vfs_mkdir+0x493/0x700 [ 2388.468465] do_mkdirat+0x150/0x2b0 [ 2388.468790] ? user_path_create+0xf0/0xf0 [ 2388.469159] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2388.469616] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2388.470063] do_syscall_64+0x33/0x40 [ 2388.470392] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2388.470832] RIP: 0033:0x7f466d9b7b19 [ 2388.471155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2388.472718] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2388.473362] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2388.473981] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2388.474593] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2388.475203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2388.475819] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:45:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20004c0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:45:48 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x208940) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) dup2(r0, r1) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000080)=0x66ac92ea) 17:45:48 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0x2000018c}], 0x1) 17:45:48 executing program 3: sendmsg(0xffffffffffffffff, 0xfffffffffffffffe, 0x4004800) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x28a042, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000080)=0x39f) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x481, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f00000001c0)) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000000240)={0x9e, ""/158}) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0x10010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f00000000c0)=@IORING_OP_POLL_REMOVE={0x7, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x8c4f) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000100)) 17:45:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000600080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:46:01 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x445, 0x24000) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/14, 0xe}], 0x1) 17:46:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3e8}}], 0x7ffff000, 0x0) 17:46:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0x7ffff000}], 0x1) 17:46:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, 0x0, 0x0, r3], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:46:01 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 8) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:46:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}}], 0x1, 0x0) 17:46:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) syz_open_dev$sg(&(0x7f0000000040), 0x2, 0x2000) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x721040, 0x80) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0x30, 0x5, 0x6, "9b29224673193f0a84c7e159888dac3b0cf3b174650f41f0891e97cc31df194b7e2ae3ffdb5ead060fb1b4494e6cfb79"}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000680080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:46:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20006c0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:46:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}}], 0x1, 0x0) [ 2401.455219] FAULT_INJECTION: forcing a failure. [ 2401.455219] name failslab, interval 1, probability 0, space 0, times 0 [ 2401.457265] CPU: 1 PID: 16235 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2401.458288] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.459527] Call Trace: [ 2401.459943] dump_stack+0x107/0x167 [ 2401.460490] should_fail.cold+0x5/0xa [ 2401.461071] ? create_object.isra.0+0x3a/0xa20 [ 2401.461756] should_failslab+0x5/0x20 [ 2401.462319] kmem_cache_alloc+0x5b/0x310 [ 2401.462939] create_object.isra.0+0x3a/0xa20 [ 2401.463619] kmemleak_alloc_percpu+0xa0/0x100 [ 2401.464292] pcpu_alloc+0x4e2/0x1240 [ 2401.464880] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 2401.465603] percpu_ref_init+0x31/0x3d0 [ 2401.466197] cgroup_mkdir+0x28b/0xf50 [ 2401.466777] ? cgroup_destroy_locked+0x710/0x710 [ 2401.467504] kernfs_iop_mkdir+0x14d/0x1e0 [ 2401.468150] vfs_mkdir+0x493/0x700 [ 2401.468708] do_mkdirat+0x150/0x2b0 [ 2401.469250] ? user_path_create+0xf0/0xf0 [ 2401.469890] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.470663] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.471424] do_syscall_64+0x33/0x40 [ 2401.472020] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2401.472801] RIP: 0033:0x7f466d9b7b19 [ 2401.473360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.476694] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2401.478116] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2401.479327] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2401.480406] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.481611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2401.482673] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:46:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x8) 17:46:01 executing program 5: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x68, r0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:udev_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) r1 = syz_open_dev$sg(&(0x7f0000000000), 0xda1, 0x131200) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000340)={0x1000, 0x0, 0x1, "e55f995c2e1be33e1cda38b6ccce5c6b0752e88c136d777198f8abacf332e4b5738ecda04be79be774fa2396758ca81573e6055910f94c22e8735d5e83ce668fcc1c43a214d40c47aad577d7be902aebf459e590c96e2dccda1ee4835184dd1c0f55209c4a6f008f42328c7a431119708b3852b9781aad7f0ad0daf9db0994d609a836d41afd4c63df5726c582c50524318bfdb6cba7b4b56c174de4d8c148d6c4196ee749ded8ac76a577e859d987a6bdd7f81bb0e5b8f43f421b2e89bcd506c750831ec3eaedc5ee5dfef626c36ad4c7447553475f4a474dc80290145182dccb7142f798804c8c363f2e9298f190a1d52e14b92499c9d026e52b2337e487eeda944df529d11059a66e8bebad1d271b6e2f6c3f8fb4eba97678deed3e70951e3ef4f3839715be7effdb01c77078dbbd42f62f45dde73b12822956ac5e1b7e474682812d37f9b3cb9a600a67c0bcac5d9043fb54f96a849732991fa54919ed79a39087c688c029c4d69a4809803d51a474e8515417ed2f2738f4f3b554221460970997bf8b5e28e23aaed201ce148d14a91aa00ec69d2d4f7c8aafc264633e359b1502bb02e3c07023fbcb7bb568f9a8e29c6a5b3e00446717a67857f143fa2195497535263852ad1fd89e79a2069899ee9d8e0b5303c55c12d943760e96c74592fd79e5544cd55cb1ba3acba4e1ee9181018300ae0205bfc4ef3038a659cf57a6dc50929f8f96133b9dd0f5379ae824aac63c79b6120d25e7a921acd3f6cfe43d29f9d0460252d5141510bd16cfe9ea8e6d3042cd570360a2365421ebcb7a896869da7a0cc5c605fd4c7afcf3e8effea4e373bb5a845d3c5074768a3ab33591bd2aa02970dda8a0726b50eb74a685f4cc8c1c9a330031c2bc82473c3b64f3c53341899d3bb2d5a4215c8a6841fc3887479c62a7b8d7801156970c55d034a45931edbcb4e3d3e4d724f4616e528f4e328e80a5cc292faf9a8f087e1cff928408fd0238b5ca3f908699a320bc680ab38659e703ee4fd4b75c7dfad2798336dda2422472a809a066a4b4389fc53c14baf8d090b4458d09014174ff9f128decb8b2aaf0e9cddf87ae7c643bd88a112eff8d2e9ff701785784d55657cb59b10ca1b0742de50063a4d8fb82e6a0476f3dca9728b37c41309149a09e16a5250f98abb45cd164c9c219e439a0d0c9ec137c6d4fb87d23ff13d596ecea296fb2e17bd7ca92f2d89c8c6add03abdc5f24a762cfa3c1296a2fdd5b861e1950588f5c09c5c4e9c00fb4aff27e319dbd49b7b4172235bb6287678577c557cd7708e984c0437e0ac8c999a16ba21a7261fecc127c92349d2c41b61f676a1671449aab883f08f2c315462e8d53f48634d711fe5a5136f9f14f574fa3fa66c97a8d5975de7d6b4a8ff0a78e4c78b7f10b50fba18e104b86bce333384536efe32e63fa03297a49560ed34bb7284d7a253d3f7a547a86959a4f154b28ce23eec622dc93c9cd0c4f94d6a4d41e39ca05a4adf4d06e5f49a68f4d023939032800ead5c55caedd36825d95a299d18d05edfa5ad8e24906fd292cb6e0d213cbc8d9a829d0086f45e2d3142b080fc38ea9e9d18aba1ea74cc99f8291cf6c8fae998fc5accc88321b77460ccdbafab13230319a34290d6e5e45f454311902dd0cb3522067f2df35832fa18b9f96dc932d4b7cc3a34773fcd173bfe8617d84231efea8f38fe9eb3980470e4f5f3d56b193c808dd81c12f0e520d34d47fe0b07a2ebe15b1087c144d634d17693a7bed9202789e872505f69b711605b2e6f1985f65cc890d8917a6cbd6326a7c737998160b2a0d14d890d24c9278add7d6b3a075e7d8e8092dbb5c7ae7ff8f939d87ca16675eaa886a4398fcd38193a97cda9224f3f127839e806e54a43dece8b4c0ab42d96acdb422748b99c2982f53ed4ae727db8f4762f9f9eb6f36beb0d31d9fadb19a79443de4015b1a9e447001b32309881a127e3f285614cfb3ee7913b076d0cf33879512ab4d14f870e50f6fbf4afb2a427cd0cfb1da4e1c060afa502696e2c4f7f0edf3f131def2b1f07e5a08c295f069c33867ec13f95477a83e51da3a19108efb0253cfee0e939b4fead079c96d330d1ae7222dda518c1718d11d958e94606dadefb36f5134c8648583d2ccc2e27209c7d06cff2eef7a5bb5940f7bb08b3acb08e7fc6f87e4b848696707a9b530b77e76407e58723b5a8b9b6a70ed1de12dc9db5e1ce13fbab7cc1ef881e3f4d66e10ce272415c3b976793fcb229a2368df9cabe333d39922fc65efc3a8cce8f8f179c94dfc181c78b4130bee3e273901107455b484a1744e66f6cc58ffe968c77bd4893f671a77ca2927edd946a68742435320b62c34f9c474195a7ec716e9afd3f834716bd808fbf22ff243a512591b893030762ba89424541a3037b030f8a9ad8cd09916c3f9a123d58404aa62188624995295c2220aba461e162acf2146c9c8aa1ec0ae205821290ae25bb78b737a9f643eb51b4b3b49afd20c6c0336976ba113c0cd57a54f86b7f806102269a95610be868a74b4722ac0ee1a9df68dffd4a93974fc77e55ac164ff56b9c6450067c47f8753c24088808d67bf70e9509d9810ecde8c6799f58c1e04e38733fdd087d8e7af564c2a0b5e2a8d7ef2b2143283ceab26b96c4a7a64f82fcf6c372264fe041b86dd258ceb690b2cc0e3c5f1c7aee8e95c5ee240feee3566865ff686b47f2fda7f11a9abb2749eaaba97562138ab36347aa354ada24e68b105433387c22c883dc6e894df63a1be8b5f4630eff980f6187892702494045a13ca045450deaa4426d10d7d171f143f684586b7ce6ca1a0361891be1836da6e34972ada45f116fd4f3f306bfb3551920e1a521b02879ebc1b340e67f59a5850b9cc5c9399195c629100b3bf88834138a7766019e5fe99bfd3f6ee7688aec7a1692c6c7830a71062a53bc8cc66f3ee5cb4ea263290b23475de67a9819d911598a539dd0578e5fe05bddc92fbb8cdbef1a388b554f6e043919fb71b557b1985bae0218e6d63a06d4ed7932228f42f32ac6197d716ed521b7c7a5c053697c846f5a79731d1e3d3f477c347793f21fbb5ba535f0842eb5d228ffe02a4276c6429edde76dc317a891748e118ad77eecf9fb35875ae0f1b7fb3a5528bc201b15818b4ca799d6d6af009f54bcdfd34e573fafb276ccaedbd185a7fce663828f5e2483b2d428c2c3f10b0f4c1ed44c6b7ddaaf4c8b35f41c4f5c50f31c1ab0873f728808452bf64751e10ceec925fb6fb19ef7280f07d8d8c43c6e9332a1777b829a717bdab21c3326b23331269b9108142f4e5b893fb8ebffa6fba8065e9e824881cf93f10a2b2a60a5298b39382f5bde641e7a4123c139de48611c68b33384a3f84b6f7b4ab1ffe4cf002172a2ccfc8a5da73d57d181b6d374aa6c2d30b0782b59332031b5d1c1655169b03ce1f46bf1855aeb41781826f7ce3e15650af1234ad19ba9ddb9305137235093f544fce33cb8fb66cd028f164fd58c36e9a84f8f252c8ce82c5add0731984ce2c30b14eed1a644475ad3f8e3418d8f251a9af3d32d3a86181876251a13c4834fedf0fe4da6981f3f5c498ad65eb46e46f6541f16805465cf90be6e603f17e03d51a558a6c14b5b3dfcb82ae5df51429477e03844a0074023d8445ce6b3687edba41a82f96cc690f5c4463ef2fd30c594ba427d2475bb0297de26e4180d6f7bffab1d1e51e761a2b13912ca43944c76eccc1fb788f1536fbb401a6d62df9471812794abcbb8c782b2c57ce901d970bc4f805a0b47d8f4743a041f649c27d99efe18aa071fb7112481c2a4dedcf4acaf403ad50bcd8d4b1fbe7911dfa676d82a0bde84c68e0f29ebd42533089e55603d5c15aa9cae8b9866fd8fb3d8b91d14b2f5790c2792724ff2a6559db9a228f96fe2b32664916330f0bdca67f236229909c3acbe9d139e88efcc089ca4daec3cc4636a2077c4904575f69d2f512377c3428fd1ddc2fc107b89fd1a81a0166b797d08f971b07e384c9802d7c38ec9f67ea60f644b3e8f745fb9b6e077202e7c5b55553f2699d11df089652e971a300dfc8cd46906adfaff24f79dcdc24323645e52881a5ba45dd46f69f7dd3f5a1c24913b3002c78f6927e88b7ec328f3219f3e37a4329f103e663a435d74e1b01fc41cb1d2db21621f77275ffd79bcfb64332381a55cb73c5f9186a5158bedcf4f821e37e8885a20da219bc560e24a5bbdeee7f482cf02097a864a89672ed722ed5d5591affed2a716fc22d5bedf016abc2db780e036298452ebb560345c376f2ef392b9acd4a7926616ce1c4235d28ee9f450ae6edeade1d7e52a22cd7538eddbfe4cd0b9a85713a47d8bac42f91c359108f40a2c28115ce8289d63b647e788e1aea85c40040e6092148c83e2e6c0b6d05785a3c0aa581e5bca0a67d22d158133e2ffab33562d7430792d2fd5aea96d68f47c437338882d2e4f64e4985c2c22724b449bb43d730265a93fad66a00825396d7725a3204b0c2f70781c53c3101fa68a0e19dbbeb5988d04f7301793b3d4ad5099a16c154845d7da89bf3e245dd508c3bf232cc27b1923b13447ee284621538bf90b04083fe3122d9147158b4fad2b4260691c276addc242090d5ee417e90c6e1995120a0a2a701b606cd9ce439d9285ccb5a99a3d494b64004722d93b1453dba2e2e471d0651fb1368c9564057905c21e6c8cf3952be101d10e57f08dd7434c2b98e65435059f3ce4893bf6d1d542b5cbf973385fa3df382b33c9540199b1db1e9b0f66789fd3c3154a4e5ad8f6e9695159507f377bace4a9c6706ec1e07d70a7530563cdf20475ff13ccf50fdcd53c36fc1540fb843da9d9520f29fc429debb85d8535fde14aa23132753a2ed21ba8037699ee6eca808f2a2f0cdae34e8c01ef6349024896a67d8e5c5eaeadf3e2a9dd7e1a72b33344fcd2178cf06781495716473d8866d8ed831b3c151d825255f4c7391dcb87a91b0aa9000a3e7e613c697a149bbb3799340c856682409427bd191fec70436c2991a77b6dd696c9a7d0b607720260d69cdac21925c310a87a9672038b6b4e92aa96bb76976edfcfb367fdb6912b8f0d1fa22b9b382d3f236b2498dddb97c8fb5bf1c20293583d518e030a36ac2facccb29f94a85f9000b3209d4484bb7fb6f8deb6a1ef577020e9b2fb3a17c027fe611f60d717674bb95cadeeba5160fb6c77627f8022321ce93a90d5d936632436ade3acdb1d9f99e6a2edf13647f85193968005c726241935e0ff39915bd420f20cba949ae70c5c125c27317bad12b97676890fd3ad63fb081c16f85efd40a6929fe182a9d17a63b922e9cc9df2da74a08acc722d2071dc2d32bbcfcd2a6a6958d7b72983270cc32a5e24fb4a7355c35143b4ae2b3c9cfa4625318846ca8c01b88933f41b66a982246bc26b8fd934347d79fa4e1f09f74e1941fc069f7d0783ab21a4d827f29c22be8cfb05c856d2c8865cdf51ab38fa1c35182fc93e3dffe591f37b77622edc619bdaf413dfbfe0466ce60816afdbdb38cb15170c3027793d401c188fed2e74cb85a9ff7509a694c3cd1a421131d56f67c9809fea1a5337b5306216af54095e28eebe8d5691c2b99b83ea8d2bd81ed6e39b7054b90fd1576eca237a531b01748ee23cca688afaac43686db9af3e61676b2df2c9a7e8deb28687687b0f0ef76a68fad4f1432f5b0291a216dd8b6bfbd0946ffbb0d574eb88006291d56eb35fa5ac0b0f4e53d343b458c823683653b223d7b668da36daadcc581be7fa322c778b4ba83a07e"}) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000040)="716bcab46678d594b2f04d06b97f0cdc88ad31b544cbf71280cda911fb", 0x1d}, {&(0x7f0000000080)="cf29e002f80dbe701bb3aa06cd548e92aae3341bb9512e2cff5633b43abaa2b51c2412cf9c0da3fc5aeebd145bb990fbb92b7cffaa2c406849d548b4901ed3baac223c0dcbc7dbc7a02ae8b34a538c7f5eb00b09c63e8a1e7619b8a7cc1879d4df26658368a21c437aed7a6cc0d994dcb410e6798da1c327281a568a52804805b12aaa487ce90b6a5bd10c7dbe183f949ca2efdf9d80b21310453939bbaca89927f493f9d3d1b96f2979c94e778eb9d0a38efbfa774a66582b7732d501e3633dd9a45e3fd6742cea4f7cdef80728357cf3256d8a66b679ea68e78024096acccd372432c5c5bb74767c884bddb275c478c3b500"/254, 0xfe}, {&(0x7f0000001d00)="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", 0x1000}, {&(0x7f0000001380)="773183f8129b5f151d7866d6fa78406a9b3d9bd8dcce8d09566ab87617cada52fcda209ca325ee4a5ce6033e447576a8e221bda8b85d2e3d5f96ce7eae65daaf92ceb8915883199e6b497ced0171f1a88aa6b246144baf377b1aa1d699fda976745bccc64e01a73b0f9163b62f97de", 0x6f}, {&(0x7f0000000240)="5b389551907a6ce3798e42cba62c435709751fda2c", 0x15}], 0x5, 0x9, 0x3f) 17:46:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) ioctl$SG_IO(r0, 0x2285, &(0x7f00000007c0)={0x53, 0x1, 0x49, 0x5, @buffer={0x0, 0x49, &(0x7f0000000600)=""/73}, &(0x7f0000000680)="63358f450d7039a132d4216256581f118d7fab8f4d33c37399fd190002063aa733b6efb7f333623a08b8dac7ab10f7d78d6fd194ea8b55017d05c32953e69cbd3e1d71806d29c12f25", &(0x7f0000000700)=""/118, 0x3, 0x0, 0x2, &(0x7f0000000780)}) ioctl$SG_IO(r0, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x76, 0x30, @scatter={0x2, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/160, 0xa0}, {&(0x7f00000001c0)=""/206, 0xce}]}, &(0x7f0000000340)="099236948b2537c9af182396a825390186b78f2fea2f5e0a517284aa20788cf8bc0fbf9cb13f40e338165a5ce7b23e6cc94deded93269332b3ce69d5a01a35068788d454d06c9c45d434e30cd0b7102d65eff9afc68875d89d6dee5ee14fa4366ef3f4225d0910d00151a918a3cd75522f63cffade25", &(0x7f00000003c0)=""/202, 0xee, 0x30, 0x0, &(0x7f0000000140)}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) syz_io_uring_setup(0x4d77, &(0x7f0000000540)={0x0, 0x253a, 0x2, 0x1, 0x2fa}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000002c0), &(0x7f00000005c0)) 17:46:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[r1, 0x0, r4], 0x3, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:46:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000740080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2401.581940] sd 0:0:0:0: [sg0] tag#0 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 2401.582854] sd 0:0:0:0: [sg0] tag#0 CDB: opcode=0x9 [ 2401.583278] sd 0:0:0:0: [sg0] tag#0 CDB[00]: 09 92 36 94 8b 25 37 c9 af 18 23 96 a8 25 39 01 [ 2401.584056] sd 0:0:0:0: [sg0] tag#0 CDB[10]: 86 b7 8f 2f ea 2f 5e 0a 51 72 84 aa 20 78 8c f8 [ 2401.584797] sd 0:0:0:0: [sg0] tag#0 CDB[20]: bc 0f bf 9c b1 3f 40 e3 38 16 5a 5c e7 b2 3e 6c [ 2401.585504] sd 0:0:0:0: [sg0] tag#0 CDB[30]: c9 4d ed ed 93 26 93 32 b3 ce 69 d5 a0 1a 35 06 [ 2401.586236] sd 0:0:0:0: [sg0] tag#0 CDB[40]: 87 88 d4 54 d0 6c 9c 45 d4 34 e3 0c d0 b7 10 2d [ 2401.586956] sd 0:0:0:0: [sg0] tag#0 CDB[50]: 65 ef f9 af c6 88 75 d8 9d 6d ee 5e e1 4f a4 36 [ 2401.587675] sd 0:0:0:0: [sg0] tag#0 CDB[60]: 6e f3 f4 22 5d 09 10 d0 01 51 a9 18 a3 cd 75 52 [ 2401.588385] sd 0:0:0:0: [sg0] tag#0 CDB[70]: 2f 63 cf fa de 25 17:46:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x1, 0x0) 17:46:01 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:16 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:16 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x300) 17:46:16 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x5dc}}], 0x7ffff000, 0x0) 17:46:16 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 9) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:46:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20007a0080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:46:16 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x121800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000040)) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000200)) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) fadvise64(r1, 0x9, 0xd75, 0x1) r2 = accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f00000001c0)=0x8, 0x4) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x6, 0x4, 0x0, 0x6, 0xfffffffb}) 17:46:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[r1, 0x0, r4], 0x3, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:46:16 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}], 0x1, 0x0) [ 2416.660415] FAULT_INJECTION: forcing a failure. [ 2416.660415] name failslab, interval 1, probability 0, space 0, times 0 [ 2416.662192] CPU: 0 PID: 16389 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2416.663219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2416.664443] Call Trace: [ 2416.664850] dump_stack+0x107/0x167 [ 2416.665394] should_fail.cold+0x5/0xa [ 2416.665963] ? create_object.isra.0+0x3a/0xa20 [ 2416.666645] should_failslab+0x5/0x20 [ 2416.667207] kmem_cache_alloc+0x5b/0x310 [ 2416.667811] ? mark_held_locks+0x9e/0xe0 [ 2416.668430] create_object.isra.0+0x3a/0xa20 [ 2416.669095] kmemleak_alloc_percpu+0xa0/0x100 [ 2416.669755] pcpu_alloc+0x4e2/0x1240 [ 2416.670324] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 2416.671029] percpu_ref_init+0x31/0x3d0 [ 2416.671619] cgroup_mkdir+0x28b/0xf50 [ 2416.672205] ? cgroup_destroy_locked+0x710/0x710 [ 2416.672918] kernfs_iop_mkdir+0x14d/0x1e0 [ 2416.673522] vfs_mkdir+0x493/0x700 17:46:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000380000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2416.674051] do_mkdirat+0x150/0x2b0 [ 2416.674694] ? user_path_create+0xf0/0xf0 [ 2416.675299] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2416.676069] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2416.676817] do_syscall_64+0x33/0x40 [ 2416.677356] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2416.678101] RIP: 0033:0x7f466d9b7b19 [ 2416.678641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2416.681296] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2416.682397] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2416.683434] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2416.684477] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2416.685497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2416.686515] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:46:16 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) setresuid(r1, r1, r1) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:16 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}}], 0x1, 0x0) 17:46:16 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffff9c, &(0x7f00000003c0)={0x131802, 0x1f, 0x6}, &(0x7f0000000400)='./file0\x00', 0x18, 0x0, 0x12345}, 0x2) setresuid(0x0, r1, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000004, 0x110, r0, 0xb0eb) r2 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x101, 0x3, &(0x7f0000000280)=[{&(0x7f00000000c0)="a63434d4fb7a3f89ba416e441f1e6f5476cfccc6934cbe61e6c50ab7d1fcc56de5690aa5a19c16a4ce9d458b0bae7752b2f6c23c8570558fff27c2eb2daeaec2a5b679c34b8b2d82ab06977d4dd7063a581f390e4fd30b39a65fbf75214e397f797a37d4db83ac750e669e3f15116ee8adef219177014f09203d871f2ff161103598313ea5005ef6fef35d75c83ac3", 0x8f, 0x3}, {&(0x7f00000001c0)="8081c224ab00f3707a9f504f5d9cdb06320013a8fdcc9b68d9913bc0466def7923431700274212ea47aa919c12faed802a1c8d2815a5b00b4cd4f7cd", 0x3c, 0x8d1e8}, {&(0x7f0000000200)="917eca145d26018caab52e5580a66245890bfe9b732b49868fd4b4d821cf8fc4d59b212c0d41cad8761d35f556c111be6960fada1c4d2be4b38fc0611992e8bc295b27c3ed0150bfa6e81e76043e718dcc7506d880a6a57e7e6ba3ae2407fe01237952a4aed1e2d8299544da5c0dc62a7124256b88d7376c04e85b", 0x7b, 0x2}], 0x22420a0, &(0x7f0000000340)={[{'/dev/sg#\x00'}, {'/dev/sg#\x00'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/sg#\x00'}}, {@hash}, {@smackfshat={'smackfshat', 0x3d, '/dev/sg#\x00'}}, {@subj_type={'subj_type', 0x3d, '/dev/sg#\x00'}}, {@obj_user}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) dup2(r0, r2) 17:46:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000100480000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:46:16 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 10) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:46:16 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000001380)={0x0, 0xfffffffffffffffd, 0xe8, 0x3f, @scatter={0x1, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)=""/4096, 0x1000}]}, &(0x7f00000001c0)="7883b89cb747259803a8e774430240666d229d7de04af36d05db8d4c873005108ed2f4b28b9b82280366c8389e22752b00fb1e66ee9ac17da91d60a28132ed6acad4db607a4e1a3fd6921c7d598c51565687f518bff6028e5c49f326158f0ebef0b9b870acf39bbddcfe7a82b81b87509dcb998cc873b62f7ba0aac0d6ae3f0a24a79a3ce82f4e5cdce7a7cc4187426befbc2f160ce5df9213a1b2077028267c7f4128545546ad2f68243bd72841f1d643c100f016af67e0a570e00337faf5f1305d2bcd456fbda88db6ceaf7bfe00007d08926ee320ebec30497704cc59fad22fceb588ca5dd42b", &(0x7f00000002c0), 0x4, 0x25, 0x3, &(0x7f0000001340)}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) setxattr$incfs_metadata(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)="a05cd3b2ab8ea39d2e50bc846a4fb3b0b7b1813e5e093ceae3c87a382990a49431a9c38632949cf8f2148cee8d01c10f215ed15fad56011e071bfd9983222df7770efa18a4bdfdf508e824af0b465e89122cb1a4ad57bd0c4c66", 0x5a, 0x3) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x20000, 0x0) openat(r2, &(0x7f0000001400)='./file0\x00', 0x60140, 0x10) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r3, 0x0) write$binfmt_aout(r3, &(0x7f0000001440)={{0x108, 0x5, 0x4, 0x335, 0x48, 0x5, 0xc2, 0xb4000000}, "2d05c82286d28639068ec4b8b45a7254529a6a0f70b0dc76dcb1b8280bdd6f731c53624e99695ac0293cb2c7b43d758217c98aa2b7b482cad5a52d75c75b05194ec01d71edce95a84343f592621a8a680c8e0f6e2156bea9091247fd166c9bec0f1a6ab7413eef04d09802b1997c5b6cb84ffc27e01786492840886354fd866784e2482b653eb3fd44ca955f04697108d46c4e9a4b2ef47fa0223f2dacda6f9791526c869af809aa1484648537853db0d141df49127583fcc68470bd6984a2c8658c703323abbea0609ad0504b74578341d9838c40826efb774f76a10081d5c9cde9204d9a03", ['\x00', '\x00', '\x00', '\x00']}, 0x506) 17:46:16 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}}], 0x1, 0x0) [ 2416.946540] FAULT_INJECTION: forcing a failure. [ 2416.946540] name failslab, interval 1, probability 0, space 0, times 0 [ 2416.948758] CPU: 1 PID: 16409 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2416.949758] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2416.950951] Call Trace: [ 2416.951368] dump_stack+0x107/0x167 [ 2416.951904] should_fail.cold+0x5/0xa [ 2416.952479] ? create_object.isra.0+0x3a/0xa20 [ 2416.953149] should_failslab+0x5/0x20 [ 2416.953707] kmem_cache_alloc+0x5b/0x310 [ 2416.954298] ? mark_held_locks+0x9e/0xe0 [ 2416.954897] create_object.isra.0+0x3a/0xa20 [ 2416.955542] kmemleak_alloc_percpu+0xa0/0x100 [ 2416.956205] pcpu_alloc+0x4e2/0x1240 [ 2416.956769] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 2416.957458] percpu_ref_init+0x31/0x3d0 [ 2416.958047] cgroup_mkdir+0x28b/0xf50 [ 2416.958616] ? cgroup_destroy_locked+0x710/0x710 [ 2416.959316] kernfs_iop_mkdir+0x14d/0x1e0 [ 2416.959926] vfs_mkdir+0x493/0x700 [ 2416.960449] do_mkdirat+0x150/0x2b0 [ 2416.960986] ? user_path_create+0xf0/0xf0 [ 2416.961597] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2416.962358] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2416.963107] do_syscall_64+0x33/0x40 [ 2416.963651] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2416.964399] RIP: 0033:0x7f466d9b7b19 [ 2416.964942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2416.967608] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2416.968715] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2416.969740] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2416.970768] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2416.971795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2416.972827] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:46:29 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x900}}], 0x7ffff000, 0x0) 17:46:29 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 11) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:46:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}}], 0x1, 0x0) 17:46:29 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[r1, 0x0, r4], 0x3, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:46:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000580000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:46:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x7f1ad9d6c8edce5e, 0xd}, 0x18) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x1) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000000c0)) 17:46:29 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="f41000001900000827bd7000ffdbdf2520000000dc005d80040072000800ff00", @ANYRESOCT=r0, @ANYRESHEX, @ANYRES32=r1, @ANYBLOB="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"], 0x10f4}}, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xda73a4652aedf0c3, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82307202, &(0x7f0000000340)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x3a1102, 0x0) r4 = openat(r2, 0x0, 0x100, 0x2) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r6 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r6, 0x0) r7 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r7, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000080)={0x0, r7, 0x8, 0x7, 0x7, 0x8}) openat(r4, &(0x7f0000000040)='./file0\x00', 0x6860, 0x3) readv(r6, &(0x7f0000000300), 0x0) 17:46:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000680000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2429.941523] FAULT_INJECTION: forcing a failure. [ 2429.941523] name failslab, interval 1, probability 0, space 0, times 0 [ 2429.942841] CPU: 1 PID: 16431 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2429.943470] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2429.944239] Call Trace: [ 2429.944497] dump_stack+0x107/0x167 [ 2429.944847] should_fail.cold+0x5/0xa [ 2429.945220] ? create_object.isra.0+0x3a/0xa20 [ 2429.945638] should_failslab+0x5/0x20 [ 2429.945981] kmem_cache_alloc+0x5b/0x310 [ 2429.946352] create_object.isra.0+0x3a/0xa20 [ 2429.946762] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2429.947236] kmem_cache_alloc_trace+0x151/0x320 [ 2429.947655] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 2429.948083] percpu_ref_init+0xd8/0x3d0 [ 2429.948455] cgroup_mkdir+0x28b/0xf50 [ 2429.948805] ? cgroup_destroy_locked+0x710/0x710 [ 2429.949233] kernfs_iop_mkdir+0x14d/0x1e0 [ 2429.949603] vfs_mkdir+0x493/0x700 [ 2429.949926] do_mkdirat+0x150/0x2b0 [ 2429.950251] ? user_path_create+0xf0/0xf0 [ 2429.950629] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2429.951099] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2429.951559] do_syscall_64+0x33/0x40 [ 2429.951898] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2429.952354] RIP: 0033:0x7f466d9b7b19 [ 2429.952688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2429.954331] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2429.955003] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2429.955645] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2429.956288] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2429.956920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2429.957554] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:46:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38000000}}], 0x1, 0x0) 17:46:29 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x6, 0x4a4902) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000780000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:46:30 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 12) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:46:30 executing program 3: ioctl$CDROMCLOSETRAY(0xffffffffffffffff, 0x5319) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x7b58a2) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xa0141, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) openat$nvram(0xffffffffffffff9c, &(0x7f0000001640), 0x101200, 0x0) ioctl$CDROM_DEBUG(0xffffffffffffffff, 0x5330, 0x1) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000980000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2430.209369] FAULT_INJECTION: forcing a failure. [ 2430.209369] name failslab, interval 1, probability 0, space 0, times 0 [ 2430.211357] CPU: 0 PID: 16562 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2430.212374] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2430.213563] Call Trace: [ 2430.213955] dump_stack+0x107/0x167 [ 2430.214491] should_fail.cold+0x5/0xa [ 2430.215050] ? create_object.isra.0+0x3a/0xa20 [ 2430.215719] should_failslab+0x5/0x20 [ 2430.216287] kmem_cache_alloc+0x5b/0x310 [ 2430.216899] create_object.isra.0+0x3a/0xa20 [ 2430.217543] kmemleak_alloc_percpu+0xa0/0x100 [ 2430.218209] pcpu_alloc+0x4e2/0x1240 [ 2430.218784] cgroup_rstat_init+0x14f/0x1f0 [ 2430.219408] cgroup_mkdir+0x709/0xf50 [ 2430.219968] ? cgroup_destroy_locked+0x710/0x710 [ 2430.220691] kernfs_iop_mkdir+0x14d/0x1e0 [ 2430.221301] vfs_mkdir+0x493/0x700 [ 2430.221825] do_mkdirat+0x150/0x2b0 [ 2430.222356] ? user_path_create+0xf0/0xf0 [ 2430.222979] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2430.223739] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2430.224491] do_syscall_64+0x33/0x40 [ 2430.225046] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2430.225792] RIP: 0033:0x7f466d9b7b19 [ 2430.226337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2430.228997] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2430.230088] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2430.231131] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2430.232159] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2430.233193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2430.234231] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:46:30 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}], 0x1, 0x0) 17:46:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:46:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000a80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:46:30 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x1100}}], 0x7ffff000, 0x0) 17:46:30 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 13) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:46:30 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000040)="609089", 0x3}, {&(0x7f0000000080)="a408c27175d94cd4d020dd05cd191c7e456026aaf49b02d29937930b14bc7102bc1c40cf9d09adc750ff878230c88a543a74c019a37751e74950d29ce9a2822367010ffae8291585cf90217c78b2a5ce7e406ebe64b2982a18ec653ad50eb7", 0x5f}, {&(0x7f00000001c0)="d89c72a0e1275200a3b89d3f7621a5abfc512f1928428333148f46f440c74df3d3048156c66ec445e6d9c238fbe2aff16c7fc083956f1be25a8bfd9ead55dfcbdb211e3dadd77130ee624161ef047fd95363a56f658c0145234ad0d4cab6ae1d278a8cfdfde0f36e410b75b6f729afaef0c539f7f6a47920d9ff2f406b800f58d9cef0c293c3e47923a017ca85c33c8d608b9cb5c6a9da5455820134b554fdf4ad82ebec143dc3b2e9953109635889a7ec9ca0000a2f5fe5417964a12f35b0f294b636e46216b6009e", 0xc9}, {&(0x7f0000000340)="722cfd5f67a07da2697ba6e6a91f06b9519b96eed7691a62a4684fb3ef3db0cbbf51e10108034ebf755f3ad7c0d27c921b8c095096fa57fe1d5b1013fc499f2f2556f2e2947d28f799f86c0ef0f766f042b49c037a610d0fa370f55f431b7b6ed38c979c46b1700e18e1b8a4e3541dba921132bb0699456af344ac4358b9fe09cd16fcc47e3fc6bace85a41ece823f3d12b01b3c9f637126501655c459d41473d1321186eadcf143ef6530c6b9cbc1945f96e2f89046bc3fb16de7be345ab12b22a7574915378dc0c6a6612152", 0xcd}, {&(0x7f0000000100)="4a2f2d62be675b380dc123c16fcb4c6eb446522f8e13016e0b9b17e0c1e04090", 0x20}, {&(0x7f0000000140)="d4ae3a6e240276f3114efc450222568471b2243523f0c8c0e0ddd28c1c5839699629f1d8b52041760ad7494fc92b338a18cffac2d59db86cb04379", 0x3b}, {&(0x7f00000002c0)="645aa3737edc9b94467f18dc8deb991061ed30fa8a9659d0b692a31e10061032e17332b13187d6bfe9f8", 0x2a}, {&(0x7f0000000440)="c0f0447d295c1c1dd85ef6ecc1c7fb2cbdfe923b8da6972eda8594e872d9205b", 0x20}], 0x8) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000bc0)) r1 = syz_mount_image$msdos(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x7fffffff, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000580)="48d76cc2b55fb85c178dce7d9a69d44a6954a0c9543a1f26e58b6c32b8b1b4aa179f7b04bc770f874f7850c951aecc4f414932f85e800273336b34753b9737d64f8394d24724ca0981c563d7c1c50e07460b40a0162563637ab91a10fe4fff0959eb369638b9dcbe2b9ae83264c87b96cc117e3cb18332ae5d40a2e6c8e6d442e380f59c12", 0x85, 0x80000000}, {&(0x7f0000000640)="fa95cc8dd97d041d2928389bbae7d713606b554675822645b40b463f137ee6caf32cc092412e1bcec05382e7316ff87087b7316929de783d2f41dbd32fd4f15266cfa11397d9128cdb6b00c637807dc6469fb105abf87d50733c96aae5ed", 0x5e, 0x3}, {&(0x7f00000006c0)="ee224f9261e79bd16a6939a41f2d5a1d5ced0c6f0474528ae8799f4e2f75403d5c056afbbbd6799bdd200a5e338d84d00e9ce0d2bb6c96fb7a4b9969598d6bbd3596cdaaca8ee9bdbbbd955a10a7fa483bc5747dc6f17231ef43c03b56a4d2c2d2e5f74006a8e4378a27d71ad2611b1fb3714937ea4e56ab5d00637fc5c225accbf6cf9cd54f725627e3d2af39cb27c2a95e58db7bc495cd62ad6e48f5", 0x9d, 0x10000}, {&(0x7f0000000780)="317dfeb46181bb0598d947324a6f58b64b9c29f2722b402c368705af378089ba81ae37805cbe057abdd7445172533205a61c555fc130679503f54636b2a7c56accace4f432c971a6ea6260054616f43bfb880d1d3632f7e32ac89722e1ab17af148681829664e79cc09736fe833dc25b72312b3b20cc483e3d602e8fcf80a2b6a5da61a86297", 0x86, 0x2}, {&(0x7f0000000840)="9358d8f452f9d40dcc262eb942cfa0d76e79529a70810e330c4279e97180bea61f4a45fa359c4fc9c66c8dd5c2feb9e8545128e253d8d16346832e119577319e5357947662d1f3fb21832601e474ed91701c75ba88630eb40e97643d2968430557ec4da03ca7d5af21f082fd1f212a61cb0ee6f80a09fae44598792927203ab14b8ebd", 0x83}, {&(0x7f0000000900)="c64538f06c96aee912d05c9a78f17b842c63cdbfbf8cf6ab24a2b31200fcf38b16f9f988c88321b172a88de43c330314e78aa00725cb7a71e730744b42eec895fe7f68667e2e6e4f8ff5e260217ea1873d59acefddd7edf156c3926d4c75c22579deefb205bfd6bfa98de12a9bc2d7feb2681cd96bbf105b76e67acbb30e323956586f13ba7def941f1074cfc01bad7d2bdab1bf20131304233888c066ddf33fee17d794d0500707e616649ed6f3e9f4c6ab31af0a28edc8a4b3cbcc782093bbc46c6d9be22d5a", 0xc7, 0x7}], 0x800000, &(0x7f0000000ac0)={[{@nodots}, {@dots}, {@nodots}, {@dots}, {@dots}, {@fat=@dos1xfloppy}], [{@fsmagic={'fsmagic', 0x3d, 0x6}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@dont_measure}, {@subj_user}]}) openat(r1, &(0x7f0000000b80)='./file0\x00', 0x200000, 0x80) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}], 0x1, 0x0) 17:46:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) [ 2430.869173] FAULT_INJECTION: forcing a failure. [ 2430.869173] name failslab, interval 1, probability 0, space 0, times 0 [ 2430.871008] CPU: 0 PID: 16681 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2430.872028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2430.873255] Call Trace: [ 2430.873657] dump_stack+0x107/0x167 [ 2430.874219] should_fail.cold+0x5/0xa [ 2430.874790] ? create_object.isra.0+0x3a/0xa20 [ 2430.875470] should_failslab+0x5/0x20 [ 2430.876036] kmem_cache_alloc+0x5b/0x310 [ 2430.876651] ? mark_held_locks+0x9e/0xe0 [ 2430.877257] create_object.isra.0+0x3a/0xa20 [ 2430.877926] kmemleak_alloc_percpu+0xa0/0x100 [ 2430.878602] pcpu_alloc+0x4e2/0x1240 [ 2430.879184] cgroup_rstat_init+0x14f/0x1f0 [ 2430.879840] cgroup_mkdir+0x709/0xf50 [ 2430.880417] ? cgroup_destroy_locked+0x710/0x710 [ 2430.881123] kernfs_iop_mkdir+0x14d/0x1e0 [ 2430.881742] vfs_mkdir+0x493/0x700 [ 2430.882280] do_mkdirat+0x150/0x2b0 [ 2430.882831] ? user_path_create+0xf0/0xf0 [ 2430.883444] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2430.884226] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2430.884986] do_syscall_64+0x33/0x40 [ 2430.885538] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2430.886293] RIP: 0033:0x7f466d9b7b19 [ 2430.886842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2430.889548] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2430.890662] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2430.891701] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2430.892744] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2430.893782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2430.894823] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:46:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:46:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x2000}}], 0x7ffff000, 0x0) 17:46:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000b80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:46:44 executing program 2: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r0 = getpid() ioprio_get$pid(0x1, r0) r1 = getpid() ioprio_get$pid(0x1, r1) r2 = getpid() ioprio_get$pid(0x1, r2) clone3(&(0x7f0000000400)={0x100000000, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), {0x12}, &(0x7f00000001c0)=""/233, 0xe9, &(0x7f0000000340)=""/138, &(0x7f0000000100)=[r0, r1, r2, 0x0], 0x4}, 0x58) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) readv(r3, &(0x7f0000000300)=[{&(0x7f0000000480)=""/218, 0xe8}, {&(0x7f0000000680)=""/228, 0xe4}, {&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f00000002c0)=""/20, 0x14}], 0x48) 17:46:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}}], 0x1, 0x0) 17:46:44 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4008004}, 0x8051) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/bus/clockevents', 0x10d000, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000240)) 17:46:44 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:46:44 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000340)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) setresuid(r1, 0xee00, r1) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)=0x1) 17:46:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000d80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2444.665120] FAULT_INJECTION: forcing a failure. [ 2444.665120] name failslab, interval 1, probability 0, space 0, times 0 [ 2444.667024] CPU: 0 PID: 16711 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2444.668071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2444.669320] Call Trace: [ 2444.669737] dump_stack+0x107/0x167 [ 2444.670323] should_fail.cold+0x5/0xa [ 2444.670909] should_failslab+0x5/0x20 [ 2444.671497] __kmalloc_track_caller+0x79/0x370 [ 2444.672192] ? kstrdup_const+0x53/0x80 [ 2444.672774] ? find_held_lock+0x2c/0x110 [ 2444.673406] kstrdup+0x36/0x70 [ 2444.673883] kstrdup_const+0x53/0x80 [ 2444.674447] __kernfs_new_node+0x9d/0x860 [ 2444.675083] ? mark_held_locks+0x9e/0xe0 [ 2444.675667] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2444.676391] ? cpumask_next+0x1f/0x30 [ 2444.676954] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2444.677665] ? pcpu_alloc+0x12a/0x1240 [ 2444.678256] kernfs_new_node+0x18d/0x250 [ 2444.678860] kernfs_create_dir_ns+0x49/0x160 [ 2444.679539] cgroup_mkdir+0x318/0xf50 [ 2444.680117] ? cgroup_destroy_locked+0x710/0x710 [ 2444.680815] kernfs_iop_mkdir+0x14d/0x1e0 [ 2444.681439] vfs_mkdir+0x493/0x700 [ 2444.681963] do_mkdirat+0x150/0x2b0 [ 2444.682519] ? user_path_create+0xf0/0xf0 [ 2444.683162] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2444.683930] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2444.684729] do_syscall_64+0x33/0x40 [ 2444.685298] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2444.686078] RIP: 0033:0x7f466d9b7b19 [ 2444.686617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2444.689345] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2444.690462] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2444.691518] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2444.692583] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2444.693630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2444.694670] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:46:44 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000080)={0xce, 0x80000001, 0xffffffff, "2b33e3d541db170966ab742b704f4428178b1d082c1d7c3ed3c791022ca749d5fed4a67990217aab1089c1e735d92b2dd8ce6d3d99872d4fb4760f25f0e24ccefced689d397ad311efd5bfe96b2aaae851d79fe9d9371969d1ea4037155f5b30c645c9c77acd5560056e7076c824080ec7cfe8ed23c2a9b7477e3fd996dbb30d577e789e6dc5dc5465907a8700dd2a6a975cc16427c4322c68073f70004cbb3a6edad910a9bf9a9914ebc59ebcd24755e7a7fa779c56296f88cfcb483f87fceee583d3dbf4ade18071f9bbb41866"}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) setresuid(0x0, r2, r4) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) fchown(r0, r5, r3) 17:46:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e000000}}], 0x1, 0x0) 17:46:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000f80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:46:44 executing program 3: timer_create(0x3, &(0x7f0000000140)={0x0, 0x18, 0x2, @thr={&(0x7f0000000100)="9c4d9ead", &(0x7f00000001c0)="eaf950a0d4f0b8b110b96afb01b42dac6bd24b6bd5c6672c3962bccbc75be63baac0f6b6c9223c120c8f1b7cd24172c8e648afe65a229f4606a0b9bcd2facdb9acb2e5de504a051f981da3c291e0da3895c180eaaca4f2eb158b701365c934315fd89af5f7c697c64ed1eb318b841ee91c08854a2617fb0fbd959136dbd8ebc4460a6484f2aa1f74eee111f6a2afd41e06846cac9c6d0d5dc7127e588c1f38a3c720012072073e10a77b50ea54e34fac8fbd8187ab16058019f03e6eef395495eecdbcf15b42dd6296a1ee904e00"}}, &(0x7f00000002c0)) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(r1, &(0x7f0000000340)='./file0\x00', 0x80100, 0x190) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) 17:46:44 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_io_uring_setup(0x7f02, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f00000002c0), 0x1f) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f0000000180)=@sco}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r6, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80800}, 0x8001) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r7, 0x10000000) syz_io_uring_submit(0x0, r8, 0x0, 0x0) syz_io_uring_submit(r6, r8, &(0x7f00000000c0)=@IORING_OP_OPENAT2={0x1c, 0x5, 0x0, r0, &(0x7f0000000040)={0x16800, 0xc4, 0x8}, &(0x7f0000000080)='./file0\x00', 0x18, 0x0, 0x12345}, 0x7) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3000}}], 0x7ffff000, 0x0) 17:46:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:46:59 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000040)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000400)={0x0, 0xfffffffffffffffb, 0xd3, 0x1, @buffer={0x0, 0x54, &(0x7f0000000080)=""/84}, &(0x7f00000001c0)="597fa0b836f79d4d731142410091216aa134fa6e111e92a6b6ed2bab4f0cdf505074420d41ed4d3b1a0fd3a2851be0092d6a2c9a00a4d5c34453127b54e5ad41b9b35232aa97e033f88d0371d2408847158ad631996aba97aa84d2299bdf1226e7d96418c744c28926e0c79ac33d42907fb85e4d070ca22f1fa50c337c6bfe657ab021a4072e888152f5e47e324e9457b5a92bedcaa098339983c74fc28441d39d5f1513a5ebbabc42637cf53379c604f0bc3f15e6fd2d59819e7d0ac88a242eb500835603081556397d3282e7f629d372a82a", &(0x7f0000000340)=""/160, 0x1f, 0x22, 0x0, &(0x7f0000000100)}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:59 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00w', @ANYRES16=r0, @ANYBLOB="000425bd7000fcdbdf25350000000c009900ae0000005f0000000a0006000802110000010000"], 0x2c}, 0x1, 0x0, 0x0, 0x844}, 0x20000040) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000200), 0xffffffffffffffff) r2 = socket$inet(0x2, 0x3, 0xff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000000)="0183ae40f3fdac402b01fa055e4299bd37dddcc8", 0x14}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @private}}}], 0x20}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000046c0)=[{{&(0x7f0000000280)=@un=@abs, 0x80, &(0x7f0000001400)=[{&(0x7f0000001d00)=""/4096, 0x1000}, {&(0x7f0000001340)=""/92, 0x5c}, {&(0x7f00000013c0)=""/16, 0x10}], 0x3, &(0x7f0000001440)=""/176, 0xb0}, 0x4}, {{&(0x7f0000001500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001580)=""/97, 0x61}], 0x1}, 0x3b}, {{&(0x7f0000001640)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000002d00)=[{&(0x7f00000016c0)=""/38, 0x26}, {&(0x7f0000001700)=""/205, 0xcd}, {&(0x7f0000001800)=""/14, 0xe}, {&(0x7f0000001840)=""/33, 0x21}, {&(0x7f0000001880)=""/177, 0xb1}, {&(0x7f0000001940)=""/118, 0x76}, {&(0x7f00000019c0)=""/202, 0xca}, {&(0x7f0000001ac0)=""/218, 0xda}], 0x8, &(0x7f0000002d80)=""/203, 0xcb}, 0x8}, {{&(0x7f0000002e80), 0x80, &(0x7f0000001c80)=[{&(0x7f0000002f00)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/9, 0x9}, {&(0x7f0000003f00)=""/170, 0xaa}, {&(0x7f0000003fc0)=""/175, 0xaf}], 0x4}, 0x8}, {{&(0x7f0000004080)=@ax25={{0x3, @bcast}, [@rose, @rose, @bcast, @null, @remote, @rose, @remote, @netrom]}, 0x80, &(0x7f0000004300)=[{&(0x7f0000004100)=""/156, 0x9c}, {&(0x7f00000041c0)=""/215, 0xd7}, {&(0x7f00000042c0)=""/41, 0x29}], 0x3}, 0x9}, {{&(0x7f0000004340)=@tipc, 0x80, &(0x7f0000004600)=[{&(0x7f00000043c0)=""/13, 0xd}, {&(0x7f0000004400)}, {&(0x7f0000004440)=""/163, 0xa3}, {&(0x7f0000004500)=""/141, 0x8d}, {&(0x7f00000045c0)=""/20, 0x14}], 0x5, &(0x7f0000004680)=""/38, 0x26}}], 0x6, 0x20, &(0x7f0000004840)={0x77359400}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000004900)={'syztnl2\x00', &(0x7f0000004880)={'sit0\x00', 0x0, 0x2f, 0xf7, 0x4, 0xe5c1, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, 0x1, 0x40, 0x7fff, 0x8}}) r7 = socket$inet(0x2, 0x3, 0xff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r7, &(0x7f0000000240)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000000)="0183ae40f3fdac402b01fa055e4299bd37dddcc8", 0x14}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @empty, @private}}}], 0x20}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'wg2\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000004f80)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000004f40)={&(0x7f0000004980)={0x594, r1, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffd6}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x8e, 0x2, 0x2, 0x9}, {0x9a, 0x9, 0x4, 0xadd}, {0x0, 0x20, 0x20, 0xd2}, {0x6, 0x6, 0x7, 0x3d2}, {0x20, 0x7f, 0xff, 0x9}]}}}]}}, {{0x8, 0x1, r4}, {0x4}}, {{0x8}, {0x25c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x12}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x21c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x12}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe469}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xe54e}}, {0x8}}}]}}]}, 0x594}, 0x1, 0x0, 0x0, 0x800}, 0x80) r11 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r12, 0x0) readv(r11, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:46:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000041080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:46:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffff7}}], 0x1, 0x0) 17:46:59 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 15) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:46:59 executing program 3: r0 = semget$private(0x0, 0x1, 0x120) semctl$IPC_RMID(r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) [ 2459.315884] FAULT_INJECTION: forcing a failure. [ 2459.315884] name failslab, interval 1, probability 0, space 0, times 0 [ 2459.317188] CPU: 1 PID: 16960 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2459.317801] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2459.318533] Call Trace: [ 2459.318791] dump_stack+0x107/0x167 [ 2459.319136] should_fail.cold+0x5/0xa [ 2459.319488] ? create_object.isra.0+0x3a/0xa20 [ 2459.319910] should_failslab+0x5/0x20 [ 2459.320273] kmem_cache_alloc+0x5b/0x310 [ 2459.320671] create_object.isra.0+0x3a/0xa20 [ 2459.321083] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2459.321547] __kmalloc_track_caller+0x177/0x370 [ 2459.321979] ? kstrdup_const+0x53/0x80 [ 2459.322329] ? find_held_lock+0x2c/0x110 [ 2459.322705] kstrdup+0x36/0x70 [ 2459.322995] kstrdup_const+0x53/0x80 [ 2459.323337] __kernfs_new_node+0x9d/0x860 [ 2459.323704] ? mark_held_locks+0x9e/0xe0 [ 2459.324076] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2459.324522] ? cpumask_next+0x1f/0x30 [ 2459.324873] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2459.325295] ? pcpu_alloc+0x12a/0x1240 [ 2459.325666] kernfs_new_node+0x18d/0x250 [ 2459.326054] kernfs_create_dir_ns+0x49/0x160 [ 2459.326462] cgroup_mkdir+0x318/0xf50 [ 2459.326825] ? cgroup_destroy_locked+0x710/0x710 [ 2459.327256] kernfs_iop_mkdir+0x14d/0x1e0 [ 2459.327639] vfs_mkdir+0x493/0x700 [ 2459.327968] do_mkdirat+0x150/0x2b0 [ 2459.328302] ? user_path_create+0xf0/0xf0 [ 2459.328701] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2459.329178] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2459.329641] do_syscall_64+0x33/0x40 [ 2459.329977] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2459.330438] RIP: 0033:0x7f466d9b7b19 [ 2459.330776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2459.332420] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2459.333121] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2459.333750] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2459.334396] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2459.335031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2459.335682] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:46:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80040000}}], 0x1, 0x0) 17:47:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000201080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:47:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3100}}], 0x7ffff000, 0x0) 17:47:13 executing program 2: write(0xffffffffffffffff, &(0x7f0000000040)="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", 0xfe) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x7fffffffffffff, 0x0) stat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000280)={0x1d, 0xd1f3, 0x2, 0x9, 0x1, [0x5, 0x4, 0x8, 0x2]}) rmdir(&(0x7f0000000140)='./file1\x00') r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x8042, 0x4) r4 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000380)={0x1f, 0x0, @none}, &(0x7f00000003c0)=0xe, 0x80800) copy_file_range(r3, &(0x7f0000000340)=0xfffffffffffffffc, r4, &(0x7f0000000400)=0xce70, 0xff, 0x0) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:47:13 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:47:13 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 16) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:47:13 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80040200}}], 0x1, 0x0) 17:47:13 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(r1, 0x0, 0x100, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000280)={0x53, 0xfffffffffffffffd, 0xa0, 0x1, @buffer={0x0, 0x8b, &(0x7f0000000040)=""/139}, &(0x7f00000001c0)="0bd465d5a283c0f71749cb6d07c198e1a91fa2f49089de0fdd176ce0506383781080d094ed8fb73aa847c96500a0fefca7e4625984129dc5dcd21e4512d8410b9c8978b8ea1237f782c07e1c2826e75a19d28f4c106a9aedb9ff543acefe91d7483e44692d6416a05c39b9381b741cc5719e0ef75c3706531ebc9e6ce2464f3171f12871080941937219f76c072190f355b9e05bed2648e50450815012056e10", &(0x7f0000000340)=""/234, 0x6, 0x10, 0xffffffffffffffff, &(0x7f0000000100)}) 17:47:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) [ 2473.152227] FAULT_INJECTION: forcing a failure. [ 2473.152227] name failslab, interval 1, probability 0, space 0, times 0 [ 2473.153505] CPU: 1 PID: 17082 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2473.154339] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2473.155013] Call Trace: [ 2473.155257] dump_stack+0x107/0x167 [ 2473.155667] should_fail.cold+0x5/0xa [ 2473.156111] ? __kernfs_new_node+0xd4/0x860 [ 2473.156557] should_failslab+0x5/0x20 [ 2473.156984] kmem_cache_alloc+0x5b/0x310 [ 2473.157453] __kernfs_new_node+0xd4/0x860 [ 2473.157901] ? mark_held_locks+0x9e/0xe0 [ 2473.158367] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2473.158860] ? cpumask_next+0x1f/0x30 [ 2473.159280] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2473.159800] ? pcpu_alloc+0x12a/0x1240 [ 2473.160196] kernfs_new_node+0x18d/0x250 [ 2473.160692] kernfs_create_dir_ns+0x49/0x160 [ 2473.161144] cgroup_mkdir+0x318/0xf50 [ 2473.161488] ? cgroup_destroy_locked+0x710/0x710 [ 2473.161970] kernfs_iop_mkdir+0x14d/0x1e0 [ 2473.162433] vfs_mkdir+0x493/0x700 [ 2473.162802] do_mkdirat+0x150/0x2b0 [ 2473.163202] ? user_path_create+0xf0/0xf0 [ 2473.163690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2473.164259] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2473.164809] do_syscall_64+0x33/0x40 [ 2473.165248] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2473.165797] RIP: 0033:0x7f466d9b7b19 [ 2473.166237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2473.168230] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2473.168999] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2473.169618] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2473.170232] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2473.170907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2473.171518] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:47:13 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:47:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000001180000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:47:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:47:13 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000}}], 0x1, 0x0) 17:47:27 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 17) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:47:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000a01180000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:47:27 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:47:27 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0xe0, 0x12, 0x100, 0x70bd2b, 0x25dfdbfc, {0xa}, [@nested={0xb7, 0x19, 0x0, 0x1, [@typed={0x14, 0x52, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x37}}, @generic="39a35a1cb59beede423d30aa845e3e28773473951ac459fb5434269ed09f8dc8485d7684f4f1e0af0cf1cd885e9b4811bc4139f37e201b5a187538973d78453f089242b612f7bc82ae86b9e96c9c2e5e2c2dd01b6f33b7ce7d78cfaea50d63f83b3d4efffa087a480fd3d3d83a2daab2d5048a92f185772d9c5d6b5aef6a4f3847503441f78d8e2016ea410cbae0d6f7d82a4814465ff03db092f112c01a67"]}, @typed={0x14, 0x16, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}]}, 0xe0}, 0x1, 0x0, 0x0, 0x10}, 0x40041) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) io_setup(0x400, &(0x7f0000000400)=0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(r3, 0x0, 0x100, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f00000004c0)) io_cancel(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x7, 0x1, r2, &(0x7f0000000440)="c32815d5a80b00fe8aae09d5a2fbde7ccc1268719ed5a9ab943f1bc2aec2bc2469a15317b7d78db5cc8d011fd7a0a8e912d91cbbd2de30256fb07ba4b56ad6d5dfb47de38c5f8f2d4f25184e83dffd4e75e4988d165037730ab96f00d42fc19c01a7f1db7ef29688725631b9d7ca599ea76cf3be", 0x74, 0x5, 0x0, 0x3, r3}, &(0x7f0000000500)) setresuid(0x0, r0, 0x0) ioprio_set$uid(0x3, r0, 0x2000) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) sendmsg$nl_xfrm(r4, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@getspdinfo={0x14, 0x25, 0x10, 0x70bd26, 0x25dfdbfe, 0x0, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4015}, 0x1) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), &(0x7f0000000280)=0xc) 17:47:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:47:27 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff}}], 0x1, 0x0) 17:47:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x4000}}], 0x7ffff000, 0x0) 17:47:27 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r1 = creat(0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r2, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000040)) [ 2488.128890] FAULT_INJECTION: forcing a failure. [ 2488.128890] name failslab, interval 1, probability 0, space 0, times 0 [ 2488.130872] CPU: 1 PID: 17227 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2488.131911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2488.133130] Call Trace: [ 2488.133535] dump_stack+0x107/0x167 [ 2488.134081] should_fail.cold+0x5/0xa [ 2488.134661] ? create_object.isra.0+0x3a/0xa20 [ 2488.135344] should_failslab+0x5/0x20 [ 2488.135923] kmem_cache_alloc+0x5b/0x310 [ 2488.136546] create_object.isra.0+0x3a/0xa20 [ 2488.137198] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2488.137943] kmem_cache_alloc+0x159/0x310 [ 2488.138556] __kernfs_new_node+0xd4/0x860 [ 2488.139164] ? mark_held_locks+0x9e/0xe0 [ 2488.139766] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2488.140470] ? cpumask_next+0x1f/0x30 [ 2488.141036] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2488.141720] ? pcpu_alloc+0x12a/0x1240 [ 2488.142305] kernfs_new_node+0x18d/0x250 [ 2488.142910] kernfs_create_dir_ns+0x49/0x160 [ 2488.143561] cgroup_mkdir+0x318/0xf50 [ 2488.144130] ? cgroup_destroy_locked+0x710/0x710 [ 2488.144825] kernfs_iop_mkdir+0x14d/0x1e0 [ 2488.145437] vfs_mkdir+0x493/0x700 [ 2488.145962] do_mkdirat+0x150/0x2b0 [ 2488.146494] ? user_path_create+0xf0/0xf0 [ 2488.147121] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2488.147897] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2488.148648] do_syscall_64+0x33/0x40 [ 2488.149204] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2488.149973] RIP: 0033:0x7f466d9b7b19 [ 2488.150518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2488.153180] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2488.154290] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2488.155327] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2488.156358] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2488.157408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2488.158435] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:47:28 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20800) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000028050190002e2f66696c653000"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x3a1102, 0x0) r4 = openat(r2, 0x0, 0x100, 0x2) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r6, 0x0) r7 = getegid() setgid(r7) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r6, r7}}, './file0\x00'}) r8 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r8, 0x0) write$binfmt_script(r8, &(0x7f0000000240)=ANY=[@ANYRES32=r8], 0x86) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r9, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f00000000c0)={0x34, 0x3, 0x1, 0x301, 0x0, 0x0, {0x5}, [@CTA_LABELS={0x4}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x16fc1ea6}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x10001}]}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x3}]}, 0x34}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x4, 0x2, 0x9, 0x97, 0x0, 0x635e, 0x222, 0x7d606f80884c18df, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x25, 0x1, @perf_bp={&(0x7f0000000140), 0x3}, 0x0, 0x36, 0xff, 0x5, 0x3, 0x200, 0x5, 0x0, 0xff}, 0xffffffffffffffff, 0x10000000000010, r1, 0x8) lseek(r1, 0x1, 0x2) 17:47:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:47:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000a11180000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:47:28 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000}}], 0x1, 0x0) 17:47:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 17:47:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000e11b80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:47:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x9, 0x404042) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x3a1102, 0x0) r4 = openat(r2, 0x0, 0x100, 0x2) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r6 = creat(0x0, 0x0) r7 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0xca0cc, 0x7, 0x0, 0x0, 0x3, 0xfffffffe}, 0x0, 0xffffffffffffffff, r6, 0x0) r8 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r8, 0x0) r9 = accept$unix(r3, &(0x7f0000000b40), &(0x7f0000000bc0)=0x6e) copy_file_range(r8, &(0x7f0000000b00)=0xea7e, r9, &(0x7f0000000c00)=0x8, 0x7f, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, &(0x7f0000000c40)=ANY=[@ANYBLOB="0100b079d4e500", @ANYRES32=r7, @ANYBLOB="00000000eecf00003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000f3444d4b7f8074fded775a7d51d51ba0470e74a6"]) ioctl$SG_IO(r6, 0x2285, &(0x7f0000000a40)={0x0, 0xfffffffffffffffd, 0x9e, 0x40, @scatter={0xa, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)=""/181, 0xb5}, {&(0x7f0000000080)=""/70, 0x46}, {&(0x7f0000000340)=""/209, 0xd1}, {&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000140)=""/34, 0x22}, {&(0x7f0000000540)=""/148, 0x94}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000600)=""/119, 0x77}, {&(0x7f0000000680)=""/66, 0x42}, {&(0x7f0000000700)=""/122, 0x7a}]}, &(0x7f0000000840)="5ec1a809381a6e246d7362298d71b0ba9f508924e54688ba7912b5c8a72db260668544206c83c78ac8c5224684967329b20aa9b5b55defea9d8e6ce6aa6ea4ffc2c9f9adb55e013f4d19395855ba453dcca342b1965e429dc4dad5ab03c23929c981848c079be4ff2c1a3d5c23458b0290b4b1e2499e61028e34a7b62356b370465986032b0820f06a8aaa823b83c66a2f2884be91aaf5ea09a87c24786e", &(0x7f0000000900)=""/226, 0xfff, 0x8024, 0x1, &(0x7f0000000a00)}) sendfile(r4, r5, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$SG_GET_LOW_DMA(r4, 0x227a, &(0x7f0000000000)) setresuid(0x0, r1, 0x0) syz_open_dev$sg(&(0x7f0000000ac0), 0x4, 0x202002) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:47:28 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x800, 0x260800) readv(r0, &(0x7f0000000040), 0x0) 17:47:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r3 = creat(0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r4, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r2], 0x4, {r3}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) 17:47:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000002080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:47:43 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000040)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:47:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x6000}}], 0x7ffff000, 0x0) 17:47:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff}}], 0x1, 0x0) 17:47:43 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 18) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:47:43 executing program 5: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:47:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) [ 2503.532318] FAULT_INJECTION: forcing a failure. [ 2503.532318] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.533756] CPU: 0 PID: 17373 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2503.534313] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.534976] Call Trace: [ 2503.535199] dump_stack+0x107/0x167 [ 2503.535495] should_fail.cold+0x5/0xa [ 2503.535809] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2503.536277] should_failslab+0x5/0x20 [ 2503.536588] kmem_cache_alloc+0x5b/0x310 [ 2503.536922] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2503.537383] idr_get_free+0x4b5/0x8f0 [ 2503.537703] idr_alloc_u32+0x170/0x2d0 [ 2503.538021] ? __fprop_inc_percpu_max+0x130/0x130 [ 2503.538412] ? lock_acquire+0x197/0x470 [ 2503.538739] ? __kernfs_new_node+0xff/0x860 [ 2503.539093] idr_alloc_cyclic+0x102/0x230 [ 2503.539426] ? idr_alloc+0x130/0x130 [ 2503.539726] ? rwlock_bug.part.0+0x90/0x90 [ 2503.540074] __kernfs_new_node+0x117/0x860 [ 2503.540416] ? mark_held_locks+0x9e/0xe0 [ 2503.540752] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2503.541153] ? cpumask_next+0x1f/0x30 [ 2503.541470] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2503.541856] ? pcpu_alloc+0x12a/0x1240 [ 2503.542180] kernfs_new_node+0x18d/0x250 [ 2503.542526] kernfs_create_dir_ns+0x49/0x160 [ 2503.542885] cgroup_mkdir+0x318/0xf50 [ 2503.543199] ? cgroup_destroy_locked+0x710/0x710 [ 2503.543582] kernfs_iop_mkdir+0x14d/0x1e0 [ 2503.543927] vfs_mkdir+0x493/0x700 [ 2503.544217] do_mkdirat+0x150/0x2b0 [ 2503.544516] ? user_path_create+0xf0/0xf0 [ 2503.544856] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.545286] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.545707] do_syscall_64+0x33/0x40 [ 2503.546012] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2503.546428] RIP: 0033:0x7f466d9b7b19 [ 2503.546732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.548193] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2503.548808] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2503.549385] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2503.549960] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2503.550538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2503.551103] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:47:43 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x900}}], 0x7ffff000, 0x0) 17:47:43 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:47:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000102080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:47:43 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) r3 = mq_open(&(0x7f00000000c0)='#\x00', 0x2, 0x8, &(0x7f00000001c0)={0xffffffff, 0x80000000, 0x466, 0x1}) mmap(&(0x7f0000473000/0x4000)=nil, 0x4000, 0x1000001, 0x4010, r3, 0x6517000) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000080)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:47:43 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/12, 0xc}, {&(0x7f0000000080)}], 0x2) 17:47:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f}}], 0x1, 0x0) 17:47:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r3 = creat(0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r4, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r2], 0x4, {r3}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) 17:47:43 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x900}}], 0x7ffff000, 0x0) 17:47:43 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r2 = socket$nl_audit(0x10, 0x3, 0x9) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000040)="1d5e78cdb2c19768e696a03c60685cee3d4d7b9698df64eb3f04bd13c7122af786c77e9d485381f944519bdc6168274037d8cf4e1b466f39a8e996927cce0a491d52a3f48bad53a9d43e62b324296101656a0cfccd80aaddec09e28ca6", 0x5d}, {&(0x7f00000000c0)="377d081b31b6d93b2490b5f5d4267f", 0xf}, {&(0x7f0000000100)="a07659c0e6381dd9bcb4e54236e71d8a5a328938aa9fc5a9d1346f8fbeffb4094e6c8713124256976fd797a2f932aa88ce10fb74c08b8b191b6fdd49f7dd18344b5dbe6d4513447febde1d6d602d1dae8271ca5fabfcf23fa25475f2645414cba025baab75e90ceb941514c84a2779e904884e652433428a32", 0x79}, {&(0x7f00000001c0)="b271a70c82d531ef3666ea1a0608ee83263ed011b2d400f2bfeac94b78c9470968e2fe857697c92ba4720ce0b7078a011a32528be72390934d1b6ca7d2ed5c449f6006ca12596af666", 0x49}, {&(0x7f0000000240)="d11d51a088f1530b2ce5d7da0f484b00a589143e11cb45b9d36978dde5dc2f2f79a3d8804842c2b05cff937459e2f043028fb4bfcbd72bd590e7e4e32c945195b3d3287e014c7d90f0915647b920221a331cfe7ba410243766b4b97b5ce3a2ed4124074b2d5857872addbb59418acfa3cc9fd2a6dc693b9e2082ff7f4c0f822822c826d5d6898459b2580f", 0x8b}, {&(0x7f0000000340)="e23539320d0a3c1badcc9715cd6a1c3d6f88cbc13d21fce09e07bbf2aaebd05765aaddd352f42f2fa31d52931b3082eaad440285", 0x34}, {&(0x7f0000000380)="ffbd278df6d21e6690e43bef22a835925ae5857e209a89ee5521947f111eeafd2a3b907cd07f7c357b67a18862920b9fb1bf857b34f418429948430dd762d258ce760f89b6405f6d2cd15be8004caa306bf9454ef907c5a4414a9bd67c80149c2f2abd87852b0f45cc73d06bd90b356e85903e46f5def76099e7ae57c9a1deb7519fa972d93b66dc70e6ed7115", 0x8d}], 0x7) 17:47:57 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000}}], 0x1, 0x0) 17:47:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r3 = creat(0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r4, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r2], 0x4, {r3}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) 17:47:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:47:57 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0xdc05}}], 0x7ffff000, 0x0) 17:47:57 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x900}}], 0x7ffff000, 0x0) 17:47:57 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 19) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:47:57 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r1 = dup2(r0, r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000040)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:47:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000d62a80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2517.961211] FAULT_INJECTION: forcing a failure. [ 2517.961211] name failslab, interval 1, probability 0, space 0, times 0 [ 2517.963142] CPU: 0 PID: 17528 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2517.964174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2517.965437] Call Trace: 17:47:57 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3e8}}], 0x7ffff000, 0x0) [ 2517.965848] dump_stack+0x107/0x167 [ 2517.966556] should_fail.cold+0x5/0xa [ 2517.967127] ? create_object.isra.0+0x3a/0xa20 [ 2517.967809] should_failslab+0x5/0x20 [ 2517.968368] kmem_cache_alloc+0x5b/0x310 [ 2517.968976] ? stack_trace_consume_entry+0x160/0x160 [ 2517.969738] create_object.isra.0+0x3a/0xa20 [ 2517.970390] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2517.971150] kmem_cache_alloc+0x159/0x310 [ 2517.971778] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2517.972614] radix_tree_extend+0x231/0x490 [ 2517.973275] idr_get_free+0x623/0x8f0 [ 2517.973837] idr_alloc_u32+0x170/0x2d0 [ 2517.974416] ? __fprop_inc_percpu_max+0x130/0x130 [ 2517.975137] ? lock_acquire+0x197/0x470 [ 2517.975743] ? __kernfs_new_node+0xff/0x860 [ 2517.976388] idr_alloc_cyclic+0x102/0x230 [ 2517.977001] ? idr_alloc+0x130/0x130 [ 2517.977560] ? rwlock_bug.part.0+0x90/0x90 [ 2517.978207] __kernfs_new_node+0x117/0x860 [ 2517.978844] ? mark_held_locks+0x9e/0xe0 [ 2517.979446] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2517.980159] ? cpumask_next+0x1f/0x30 [ 2517.980716] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2517.981415] ? pcpu_alloc+0x12a/0x1240 [ 2517.982002] kernfs_new_node+0x18d/0x250 [ 2517.982628] kernfs_create_dir_ns+0x49/0x160 [ 2517.983289] cgroup_mkdir+0x318/0xf50 [ 2517.983868] ? cgroup_destroy_locked+0x710/0x710 [ 2517.984572] kernfs_iop_mkdir+0x14d/0x1e0 [ 2517.985193] vfs_mkdir+0x493/0x700 [ 2517.985725] do_mkdirat+0x150/0x2b0 [ 2517.986267] ? user_path_create+0xf0/0xf0 [ 2517.986902] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2517.987672] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2517.988437] do_syscall_64+0x33/0x40 [ 2517.988999] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2517.989758] RIP: 0033:0x7f466d9b7b19 [ 2517.990313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2517.993017] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2517.994112] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2517.995166] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2517.996210] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2517.997251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2517.998293] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:47:57 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000}}], 0x1, 0x0) 17:47:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000002e80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:47:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r3], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}}) 17:47:57 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = creat(0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r4, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) getpeername$unix(r3, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) setresuid(r2, r5, r1) 17:47:57 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3e8}}], 0x7ffff000, 0x0) [ 2518.084325] 9pnet: Insufficient options for proto=fd 17:47:58 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000}}], 0x1, 0x0) 17:47:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000003f80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:48:12 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3e8}}], 0x7ffff000, 0x0) 17:48:12 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) r1 = getuid() ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000040)=0xe0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x3a1102, 0x0) r4 = openat(r2, 0x0, 0x100, 0x2) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) renameat(r4, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:48:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:48:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0xe803}}], 0x7ffff000, 0x0) 17:48:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000004080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:48:12 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}}], 0x1, 0x0) 17:48:12 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 20) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:48:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r3], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}}) [ 2532.856899] 9pnet: Insufficient options for proto=fd [ 2532.878517] FAULT_INJECTION: forcing a failure. [ 2532.878517] name failslab, interval 1, probability 0, space 0, times 0 [ 2532.881346] CPU: 1 PID: 17681 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2532.882465] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2532.883819] Call Trace: [ 2532.884262] dump_stack+0x107/0x167 [ 2532.884875] should_fail.cold+0x5/0xa [ 2532.885515] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2532.886462] should_failslab+0x5/0x20 [ 2532.887098] kmem_cache_alloc+0x5b/0x310 [ 2532.887788] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2532.888708] idr_get_free+0x4b5/0x8f0 [ 2532.889368] idr_alloc_u32+0x170/0x2d0 [ 2532.890012] ? __fprop_inc_percpu_max+0x130/0x130 [ 2532.890700] ? lock_acquire+0x197/0x470 [ 2532.891334] ? __kernfs_new_node+0xff/0x860 [ 2532.892061] idr_alloc_cyclic+0x102/0x230 [ 2532.892757] ? idr_alloc+0x130/0x130 [ 2532.893389] ? rwlock_bug.part.0+0x90/0x90 [ 2532.894103] __kernfs_new_node+0x117/0x860 [ 2532.894813] ? mark_held_locks+0x9e/0xe0 [ 2532.895489] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2532.896270] ? cpumask_next+0x1f/0x30 [ 2532.896900] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2532.897534] ? pcpu_alloc+0x12a/0x1240 [ 2532.898190] kernfs_new_node+0x18d/0x250 [ 2532.898890] kernfs_create_dir_ns+0x49/0x160 [ 2532.899619] cgroup_mkdir+0x318/0xf50 [ 2532.900253] ? cgroup_destroy_locked+0x710/0x710 [ 2532.901047] kernfs_iop_mkdir+0x14d/0x1e0 [ 2532.901744] vfs_mkdir+0x493/0x700 [ 2532.902336] do_mkdirat+0x150/0x2b0 [ 2532.902947] ? user_path_create+0xf0/0xf0 [ 2532.903644] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2532.904516] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2532.905377] do_syscall_64+0x33/0x40 [ 2532.905877] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2532.906696] RIP: 0033:0x7f466d9b7b19 [ 2532.907298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2532.910462] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2532.911857] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2532.913148] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2532.914339] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2532.915413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2532.916487] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:48:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000004880000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:48:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r3], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}}) 17:48:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, 0x0, 0x0, r3], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 17:48:12 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000}}], 0x1, 0x0) 17:48:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000004c80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2533.004152] 9pnet: Insufficient options for proto=fd 17:48:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000200)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$nl_generic(0x10, 0x3, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x41, &(0x7f0000001980)=ANY=[@ANYBLOB="7472616e733d666421a8ae7f292c728be1e40fb77327801a556f5a4a1e5a886119e33db9172830fa12c75cf2bd0c3da86deaf99d7143667a6118f463aebea570c625070081f53df3ac177c9bd84735658fafb88f92250000e8a629c7e185ff41690b2d97d1ebfff9f3bfbb519cd94539152b88dc9790b6d8db115bc83c36c51f5e01d4ea49a3", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',version=9p2000,version=9p2000.u,afid=0x0000000000000005,version=9p2000,access=user,afid=0x0000000000000003,mmap,dfltgid=', @ANYRESHEX=r2, @ANYBLOB="2c02696e745f2c617564697400040000fd43e3d3852624bfe4595f524541442c002b66497eca18"]) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r3, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f00000001c0)=0x3) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000140)=""/4, 0x4}, {&(0x7f0000000340)=""/168, 0xa8}, {&(0x7f0000000400)=""/107, 0x6b}, {&(0x7f00000002c0)=""/52, 0x34}], 0x4, &(0x7f00000004c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000001780)={0x53, 0xfffffffffffffffd, 0x76, 0x5, @buffer={0x0, 0x1000, &(0x7f00000005c0)=""/4096}, &(0x7f00000015c0)="d072b6281c3c6980798538c1bea147ba9f248d9f3e4e990848361c089ba5374357ee9b08d77ce016bb91edd7c653a0acb1ce60fe7570b97f02ff071534ccde470c954beed792c512bf2993f50d5871f803030444bdcdbf9a7614c4570d18de55adab81843ed6d22c1ad9555823ab68720d0bea022bbb", &(0x7f0000001640)=""/248, 0x7, 0x0, 0x0, &(0x7f0000001740)}) 17:48:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r3], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}}) 17:48:13 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef}}], 0x1, 0x0) 17:48:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = signalfd(r0, &(0x7f0000000040)={[0x1ff]}, 0x8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) [ 2533.178438] 9pnet: Insufficient options for proto=fd 17:48:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@private1}}, &(0x7f0000000140)=0xe8) setresuid(r2, r1, r1) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:48:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000006080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:48:26 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0xf401}}], 0x7ffff000, 0x0) 17:48:26 executing program 2: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 17:48:26 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 21) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:48:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r3], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}}) 17:48:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x300}}], 0x7ffff000, 0x0) 17:48:26 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x1, 0x0) [ 2547.045853] 9pnet: Insufficient options for proto=fd [ 2547.053550] FAULT_INJECTION: forcing a failure. [ 2547.053550] name failslab, interval 1, probability 0, space 0, times 0 [ 2547.055730] CPU: 0 PID: 17731 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2547.056736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2547.057968] Call Trace: [ 2547.058364] dump_stack+0x107/0x167 [ 2547.058896] should_fail.cold+0x5/0xa [ 2547.059454] ? create_object.isra.0+0x3a/0xa20 [ 2547.060123] should_failslab+0x5/0x20 [ 2547.060689] kmem_cache_alloc+0x5b/0x310 [ 2547.061293] create_object.isra.0+0x3a/0xa20 [ 2547.061957] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2547.062700] kmem_cache_alloc+0x159/0x310 [ 2547.063317] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2547.064136] idr_get_free+0x4b5/0x8f0 [ 2547.064711] idr_alloc_u32+0x170/0x2d0 [ 2547.065290] ? __fprop_inc_percpu_max+0x130/0x130 [ 2547.066031] ? lock_acquire+0x197/0x470 [ 2547.066623] ? __kernfs_new_node+0xff/0x860 [ 2547.067262] idr_alloc_cyclic+0x102/0x230 [ 2547.067880] ? idr_alloc+0x130/0x130 [ 2547.068424] ? rwlock_bug.part.0+0x90/0x90 [ 2547.069056] __kernfs_new_node+0x117/0x860 [ 2547.069679] ? mark_held_locks+0x9e/0xe0 [ 2547.070273] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2547.070964] ? cpumask_next+0x1f/0x30 [ 2547.071521] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2547.072218] ? pcpu_alloc+0x12a/0x1240 [ 2547.072811] kernfs_new_node+0x18d/0x250 [ 2547.073426] kernfs_create_dir_ns+0x49/0x160 [ 2547.074099] cgroup_mkdir+0x318/0xf50 [ 2547.074661] ? cgroup_destroy_locked+0x710/0x710 [ 2547.075355] kernfs_iop_mkdir+0x14d/0x1e0 [ 2547.075964] vfs_mkdir+0x493/0x700 [ 2547.076484] do_mkdirat+0x150/0x2b0 [ 2547.077021] ? user_path_create+0xf0/0xf0 [ 2547.077637] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2547.078393] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2547.079147] do_syscall_64+0x33/0x40 [ 2547.079699] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2547.080436] RIP: 0033:0x7f466d9b7b19 [ 2547.080990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2547.083651] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2547.084778] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2547.085820] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2547.086849] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2547.087896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2547.088924] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:48:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:48:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000006880000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:48:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x300}}], 0x7ffff000, 0x0) 17:48:27 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}}], 0x1, 0x0) 17:48:27 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x3a1102, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = openat(0xffffffffffffffff, 0x0, 0x100, 0x2) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) ioctl$LOOP_SET_DIRECT_IO(r5, 0x4c08, 0x101) setresuid(0x0, r4, 0x0) ioprio_set$uid(0x3, r4, 0x2000) 17:48:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r4 = creat(0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r5, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r3], 0x4, {r4}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}}) 17:48:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000006c80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2547.251114] 9pnet: Insufficient options for proto=fd 17:48:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x300}}], 0x7ffff000, 0x0) 17:48:47 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r3, 0x0) fallocate(r3, 0xa, 0x4, 0x5) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000080)={0x2, 0x4, 0x33}) 17:48:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}], 0x1, 0x0) 17:48:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0xff03}}], 0x7ffff000, 0x0) 17:48:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000007480000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:48:47 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 22) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:48:47 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20) setresuid(0x0, r1, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000040)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)={0x1c, 0x10, 0x0, 0x0, 0x0, 0x0, {}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@nl=@unspec, &(0x7f0000000180)=0x80) getsockname(r2, &(0x7f00000000c0)=@isdn, &(0x7f0000000140)=0x80) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)=0x0) syz_open_procfs(r3, &(0x7f0000000200)='timerslack_ns\x00') 17:48:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0xe803}}], 0x7ffff000, 0x0) 17:48:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (fail_nth: 1) 17:48:47 executing program 2: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000040)) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) [ 2567.778937] FAULT_INJECTION: forcing a failure. [ 2567.778937] name failslab, interval 1, probability 0, space 0, times 0 [ 2567.780039] CPU: 0 PID: 17880 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 2567.780655] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2567.781400] Call Trace: [ 2567.781646] dump_stack+0x107/0x167 [ 2567.781980] should_fail.cold+0x5/0xa [ 2567.782325] should_failslab+0x5/0x20 [ 2567.782669] __kmalloc_track_caller+0x79/0x370 [ 2567.783079] ? strndup_user+0x74/0xe0 [ 2567.783422] memdup_user+0x22/0xd0 [ 2567.783743] strndup_user+0x74/0xe0 [ 2567.784071] __x64_sys_mount+0x133/0x300 [ 2567.784431] ? copy_mnt_ns+0xa00/0xa00 [ 2567.784787] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2567.785270] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2567.785746] do_syscall_64+0x33/0x40 [ 2567.786089] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2567.786542] RIP: 0033:0x7ff76506eb19 [ 2567.786874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2567.788515] RSP: 002b:00007ff7625e4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2567.789202] RAX: ffffffffffffffda RBX: 00007ff765181f60 RCX: 00007ff76506eb19 [ 2567.789843] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2567.790480] RBP: 00007ff7625e41d0 R08: 0000000020000100 R09: 0000000000000000 [ 2567.791117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2567.791755] R13: 00007ffd6a1299cf R14: 00007ff7625e4300 R15: 0000000000022000 [ 2567.819424] FAULT_INJECTION: forcing a failure. [ 2567.819424] name failslab, interval 1, probability 0, space 0, times 0 [ 2567.821748] CPU: 1 PID: 17881 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2567.822763] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2567.823963] Call Trace: [ 2567.824357] dump_stack+0x107/0x167 [ 2567.824894] should_fail.cold+0x5/0xa [ 2567.825458] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2567.826308] should_failslab+0x5/0x20 [ 2567.826866] kmem_cache_alloc+0x5b/0x310 [ 2567.827472] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2567.828293] idr_get_free+0x4b5/0x8f0 [ 2567.828872] idr_alloc_u32+0x170/0x2d0 [ 2567.829449] ? __fprop_inc_percpu_max+0x130/0x130 [ 2567.830173] ? lock_acquire+0x197/0x470 [ 2567.830753] ? __kernfs_new_node+0xff/0x860 [ 2567.831394] idr_alloc_cyclic+0x102/0x230 [ 2567.832002] ? idr_alloc+0x130/0x130 [ 2567.832548] ? rwlock_bug.part.0+0x90/0x90 [ 2567.833182] __kernfs_new_node+0x117/0x860 [ 2567.833807] ? mark_held_locks+0x9e/0xe0 [ 2567.834369] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2567.835066] ? cpumask_next+0x1f/0x30 [ 2567.835626] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2567.836309] ? pcpu_alloc+0x12a/0x1240 [ 2567.836893] kernfs_new_node+0x18d/0x250 [ 2567.837498] kernfs_create_dir_ns+0x49/0x160 [ 2567.838157] cgroup_mkdir+0x318/0xf50 [ 2567.838725] ? cgroup_destroy_locked+0x710/0x710 [ 2567.839418] kernfs_iop_mkdir+0x14d/0x1e0 [ 2567.840028] vfs_mkdir+0x493/0x700 [ 2567.840558] do_mkdirat+0x150/0x2b0 [ 2567.841106] ? user_path_create+0xf0/0xf0 [ 2567.841731] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2567.842498] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2567.843259] do_syscall_64+0x33/0x40 [ 2567.843807] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2567.844552] RIP: 0033:0x7f466d9b7b19 [ 2567.845095] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2567.847771] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2567.848876] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2567.849916] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2567.850962] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2567.851991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2567.853018] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:48:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:48:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (fail_nth: 2) 17:48:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000007a80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:48:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0xe803}}], 0x7ffff000, 0x0) 17:48:47 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x5, 0x8}, {0x1, 0xfffffff8}]}, 0x14, 0x3) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) [ 2567.884376] FAULT_INJECTION: forcing a failure. [ 2567.884376] name failslab, interval 1, probability 0, space 0, times 0 [ 2567.886210] CPU: 1 PID: 17891 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 2567.887211] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2567.888407] Call Trace: [ 2567.888816] dump_stack+0x107/0x167 [ 2567.889355] should_fail.cold+0x5/0xa [ 2567.889941] ? create_object.isra.0+0x3a/0xa20 [ 2567.890611] should_failslab+0x5/0x20 [ 2567.891166] kmem_cache_alloc+0x5b/0x310 [ 2567.891770] create_object.isra.0+0x3a/0xa20 [ 2567.892410] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2567.893154] __kmalloc_track_caller+0x177/0x370 [ 2567.893845] ? strndup_user+0x74/0xe0 [ 2567.894412] memdup_user+0x22/0xd0 [ 2567.894946] strndup_user+0x74/0xe0 [ 2567.895478] __x64_sys_mount+0x133/0x300 [ 2567.896071] ? copy_mnt_ns+0xa00/0xa00 [ 2567.896647] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2567.897415] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2567.898171] do_syscall_64+0x33/0x40 [ 2567.898719] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2567.899460] RIP: 0033:0x7ff76506eb19 [ 2567.900009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2567.902635] RSP: 002b:00007ff7625e4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2567.903738] RAX: ffffffffffffffda RBX: 00007ff765181f60 RCX: 00007ff76506eb19 [ 2567.904763] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2567.905793] RBP: 00007ff7625e41d0 R08: 0000000020000100 R09: 0000000000000000 [ 2567.906818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2567.907837] R13: 00007ffd6a1299cf R14: 00007ff7625e4300 R15: 0000000000022000 17:48:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0xe803}}], 0x7ffff000, 0x0) 17:49:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) setresuid(r3, r4, r5) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f00000001c0)={{r2}, 0x8, &(0x7f0000000100)=[0x10001, 0x0, 0x9e3, 0x2, 0x7fff, 0x4, 0x5, 0x6579], 0xdc, 0x1, [0xf9a, 0x2, 0x1, 0xffff]}) accept4$unix(0xffffffffffffffff, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e, 0x80000) setresuid(0x0, r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000140)={0xffffffffffffffff, 0x91e, 0x5, 0x80}) sendmsg$nl_generic(r6, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x40000}, 0x40004) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000040)='!:#@%%\'}\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:49:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="200011a080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:02 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0) 17:49:02 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 23) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:49:02 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000380)={{0xa, 0x4e20, 0x7, @mcast2}, {0xa, 0x4e22, 0x5, @mcast1, 0x1}, 0x6, [0x102, 0x200000, 0x8, 0x0, 0x80, 0x6, 0x40, 0x7]}, 0x5c) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x46e2, 0x20) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6e, 0x0, 0x9, 0x1, 0x3ff, 0x3, 0x3e, 0x3f, 0x2b, 0x40, 0x3a5, 0x4, 0x7, 0x38, 0x1, 0x2000, 0x8, 0xef}, [{0x4, 0x6, 0x1, 0x7, 0x7f, 0x3, 0xa3d6, 0x1}, {0x12266aafe9bb281, 0x40, 0x6, 0x3f, 0x80000000, 0x9, 0x2, 0x1}], "553381c3d58c5363d2300a21b103782c95b508cda5415b027ba5e6665d0fe1f002b221074e63b4607b4bbbf379e5419286c15add0273581447c0dc01869e46ae8f1e882890e633f9d9204d779884b01414d2b14fafd82e0bd7e7c49727218355e2151a53d1b61c6d49bfe77aa4b7e6dac57a4a22a03908d6fb46ec07b255325093250b435239f35b85acecae845dffa8d2561fce239ce8768d5d38c43679adf167ec746abdcaa8dceadfc550ce027ff62cebb81bd359799e430441047ad960882bbdea863a7d9ee846a261fc46185e29a33415e82c2ccb984e66d2456cf07f14029988117c02541ee67e4c1aa6dd9509"}, 0x1a0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYRESHEX, @ANYBLOB], 0xfdef) io_destroy(0x0) r2 = dup(0xffffffffffffffff) mount$bind(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_generic(r2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x13c, 0x1a, 0x1, 0x0, 0x25dfdbfb, {{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@private2, 0x0, 0x33}, @in=@private=0xa010100, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x3, 0x0, 0x8000008000) 17:49:02 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (fail_nth: 3) 17:49:02 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x34000}}], 0x7ffff000, 0x0) 17:49:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@private0}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) setresuid(r4, r3, r1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={r2, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100}, 0xc) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) [ 2582.720497] FAULT_INJECTION: forcing a failure. [ 2582.720497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2582.722827] CPU: 1 PID: 18016 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 2582.723861] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2582.725259] Call Trace: [ 2582.725660] dump_stack+0x107/0x167 [ 2582.726196] should_fail.cold+0x5/0xa [ 2582.726753] _copy_from_user+0x2e/0x1b0 [ 2582.726877] FAULT_INJECTION: forcing a failure. [ 2582.726877] name failslab, interval 1, probability 0, space 0, times 0 [ 2582.727327] memdup_user+0x65/0xd0 [ 2582.729388] strndup_user+0x74/0xe0 [ 2582.729929] __x64_sys_mount+0x133/0x300 [ 2582.730505] ? copy_mnt_ns+0xa00/0xa00 [ 2582.731076] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2582.731827] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2582.732553] do_syscall_64+0x33/0x40 [ 2582.733083] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2582.733814] RIP: 0033:0x7ff76506eb19 [ 2582.734351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2582.736975] RSP: 002b:00007ff7625e4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2582.738103] RAX: ffffffffffffffda RBX: 00007ff765181f60 RCX: 00007ff76506eb19 [ 2582.739115] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2582.740122] RBP: 00007ff7625e41d0 R08: 0000000020000100 R09: 0000000000000000 [ 2582.741130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2582.742149] R13: 00007ffd6a1299cf R14: 00007ff7625e4300 R15: 0000000000022000 [ 2582.743199] CPU: 0 PID: 18019 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2582.744264] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2582.745425] Call Trace: [ 2582.745827] dump_stack+0x107/0x167 [ 2582.746363] should_fail.cold+0x5/0xa [ 2582.746905] ? create_object.isra.0+0x3a/0xa20 [ 2582.747552] should_failslab+0x5/0x20 [ 2582.748088] kmem_cache_alloc+0x5b/0x310 [ 2582.748666] ? mark_held_locks+0x9e/0xe0 [ 2582.749245] create_object.isra.0+0x3a/0xa20 [ 2582.749879] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2582.750616] kmem_cache_alloc+0x159/0x310 [ 2582.751212] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2582.752006] idr_get_free+0x4b5/0x8f0 [ 2582.752566] idr_alloc_u32+0x170/0x2d0 [ 2582.753130] ? __fprop_inc_percpu_max+0x130/0x130 [ 2582.753812] ? lock_acquire+0x197/0x470 [ 2582.754380] ? __kernfs_new_node+0xff/0x860 [ 2582.755001] idr_alloc_cyclic+0x102/0x230 [ 2582.755590] ? idr_alloc+0x130/0x130 [ 2582.756129] ? rwlock_bug.part.0+0x90/0x90 [ 2582.756746] __kernfs_new_node+0x117/0x860 [ 2582.757341] ? mark_held_locks+0x9e/0xe0 [ 2582.757928] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2582.758604] ? cpumask_next+0x1f/0x30 [ 2582.759144] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2582.759812] ? pcpu_alloc+0x12a/0x1240 [ 2582.760376] kernfs_new_node+0x18d/0x250 [ 2582.760967] kernfs_create_dir_ns+0x49/0x160 [ 2582.761595] cgroup_mkdir+0x318/0xf50 [ 2582.762162] ? cgroup_destroy_locked+0x710/0x710 [ 2582.762841] kernfs_iop_mkdir+0x14d/0x1e0 [ 2582.763428] vfs_mkdir+0x493/0x700 [ 2582.763936] do_mkdirat+0x150/0x2b0 [ 2582.764456] ? user_path_create+0xf0/0xf0 [ 2582.765050] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2582.765784] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2582.766518] do_syscall_64+0x33/0x40 [ 2582.767045] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2582.767780] RIP: 0033:0x7f466d9b7b19 [ 2582.768309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2582.770864] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2582.771934] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2582.772935] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2582.773937] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2582.774932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2582.775933] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:49:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="200011a180000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:49:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 17:49:02 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (fail_nth: 4) 17:49:02 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x0) [ 2583.001872] FAULT_INJECTION: forcing a failure. 17:49:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20002ad680000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2583.001872] name failslab, interval 1, probability 0, space 0, times 0 [ 2583.004047] CPU: 1 PID: 18143 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 2583.005067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.006282] Call Trace: [ 2583.006676] dump_stack+0x107/0x167 [ 2583.007210] should_fail.cold+0x5/0xa [ 2583.007773] ? copy_mount_options+0x55/0x180 [ 2583.008431] should_failslab+0x5/0x20 [ 2583.009004] kmem_cache_alloc_trace+0x55/0x320 [ 2583.009678] ? _copy_from_user+0xfb/0x1b0 [ 2583.010297] copy_mount_options+0x55/0x180 [ 2583.010894] __x64_sys_mount+0x1a8/0x300 [ 2583.011484] ? copy_mnt_ns+0xa00/0xa00 [ 2583.012051] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2583.012813] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2583.013577] do_syscall_64+0x33/0x40 [ 2583.014135] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2583.014860] RIP: 0033:0x7ff76506eb19 [ 2583.015385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2583.018033] RSP: 002b:00007ff7625e4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2583.019157] RAX: ffffffffffffffda RBX: 00007ff765181f60 RCX: 00007ff76506eb19 [ 2583.020193] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2583.021197] RBP: 00007ff7625e41d0 R08: 0000000020000100 R09: 0000000000000000 [ 2583.022241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2583.023239] R13: 00007ffd6a1299cf R14: 00007ff7625e4300 R15: 0000000000022000 17:49:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000100), 0x7879, 0x40) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffb, 0x42) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:syslogd_var_run_t:s0\x00', 0x27, 0x1) setresuid(0x0, r2, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:49:02 executing program 3: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000001, 0x11, 0xffffffffffffffff, 0x8b868000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c, 0x80000) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) fadvise64(r0, 0xffffffff, 0x8, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80, 0x1) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200a02, 0x100) r2 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index=0x5, 0x85, 0x0, 0x1, 0x0, 0x1}, 0x8) setxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)=@known='trusted.syz\x00', &(0x7f0000000240)='%\x00', 0x2, 0x1) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280), 0x100, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r3, 0x4018f50b, &(0x7f00000002c0)={0x1, 0x6, 0x800}) readlinkat(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=""/106, 0x6a) r4 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0xea72}}, './file0/file0\x00'}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000400)="7888ddaee9b1e34529d52ea336c0", 0xe}, {&(0x7f0000000440)="2bfeff2fbd26f21207d9db42367b6fa9f40a26111b911ee178cf612f75d94ea8b1422d26bbb2927db29df671df8c2c37e473acda2f8ee843691e05de61e9d43a09486842110766c0d20519254305e39158c756e4c293e16d3ad1c764292ece0bb8acb9ebdb837a8da8eed4ef4084aac7102ffa018b0591b80de5e250342f8c3e3f78901df418444a962e", 0x8a}, {&(0x7f0000000500)="0024b0c60c155de1702df0ba6f040965cf4734d79f08c3b70f1e366122d15db9addcee225e78446a7e48ecdcd9de6a18b6d9d62b28ccb79868579339f0ff3d3a8faf93c95e0851ac5d84bcc5beb9dc9753ecb7a6b30cf7224ed1f0a3949363b96f675bc9733b386bba3681d472f6a06681364917f4de2414e04d86e51a346a849f90017ba3e0be58dda6bf7aa5ddc17da390a849ca50a2a5f97087b9e0d82978f5d6b036f9056153a6b27d965e0f", 0xae}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)="7927087c51b08e62a247b7914ee6665fe9189cdd7cdfc1a0c46413b4f2f2f0f3ca6f5f47aeedacbab40a17629cb1c0325a9ead6374dc244295ab962b455cd42f9a9bc930eb2eace8cf7877d1b0edc82382f95d5e2400a20899ddf399092f647b5afafe1a2ed720ad2512edd2ddf876eff1287a7bcf5697e24a1ae0e8f1453092679d8b6942f01fbcc094f33283ee422e96aca1cec129ec9d876218ef5d629ea58972f3a0d341d1a3e43416c11f8f3812b096329ea1e70eb2efee21c4bff952c2146ffbc981", 0xc5}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000026c0)="88f5d0ccf2ce94d4a719932f051d3d9cd304cde1dc7aa9af4b1c573cd0d922f19f59245a34fdb98bcc8816468dc910a22d58cbbe6c87d5159a2cbb5211b371482d6211dbd624174275ecd561d33df0bb04f87a90f20d14060dcc52f8835ad41673eba81961379a14afbcb7a93d19c91e5758712b97487e6a3b7fff7a0e713d47b300c759b318fc4de119dcf2ee8511b41dda9f655f1e9787b69131c83082b7ddbc05c07b59a857c37ef86adfeb8c61bf1f650079e002bb74b2e445f3cdd492dbf012caffe03ff4ba7bf0481e636ce8ab45bfbfb7f4d533c845b40862de7479873fa1e2", 0xe3}, {&(0x7f00000027c0)="3b9dbd04d1e9f3f92e44a249ec51ab953ac24129d8df1a7995e3783c7765ce0c81fe4f2f9f317326366d6244251008e0a0583bb834631dad5b90a04fa7fdd65b85c2d79bebf4fba6e9430ccdb9465def53256861fb78165f93c229d42c6a61df89fc3ef8823ccf2b6eb6353ddbcadd1f01979c9ec0f0bcd868c3f6e2b84620408872235b16c6d54936a2b054409bebee928ca1a3b2967eab10b9376b96577a232f79", 0xa2}, {&(0x7f0000002880)="ce9f210c6deab081c0cddea32fdf6f2d092a40fbf4f7b41df5a43ab718279e2f38288118701d40bf8e189603a5128cf75c7fdcec1de9efcefe3d7f52f921ff1523bf34cc753a906a3a251a58258668c99efb34f3e1c447d5775dcc71df2b0146f3924c47c38f6143c4ad7883f3f8d3b8a9d5901bb0c6ec703289e9b152622fd20c54a6da5a22a99e8ce9dd1edb5445bafcbd891f1d6c51150f4a2cfc3d8ad374a3cd6cb80707db372ab05d69b775", 0xae}], 0x9, 0x0, 0x0, 0x4094804}, 0x80) open(&(0x7f0000002a40)='./file0/file0\x00', 0x20080, 0x1a2) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0x2, 0x80010, r2, 0x8000000) syz_io_uring_setup(0x2cfa, &(0x7f0000002a80)={0x0, 0xcee5, 0x0, 0x3, 0x372, 0x0, r1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000002b00), &(0x7f0000002b40)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000002c00)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f0000002bc0), 0x1, 0x1}, 0xfffff987) 17:49:02 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 24) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:49:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20001be180000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2583.197061] FAULT_INJECTION: forcing a failure. [ 2583.197061] name failslab, interval 1, probability 0, space 0, times 0 [ 2583.198944] CPU: 1 PID: 18156 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2583.199912] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.201111] Call Trace: [ 2583.201492] dump_stack+0x107/0x167 [ 2583.202017] should_fail.cold+0x5/0xa [ 2583.202560] ? selinux_kernfs_init_security+0x137/0x4c0 [ 2583.203314] should_failslab+0x5/0x20 [ 2583.203870] __kmalloc+0x72/0x390 [ 2583.204388] selinux_kernfs_init_security+0x137/0x4c0 [ 2583.205141] ? selinux_file_mprotect+0x610/0x610 [ 2583.205819] ? find_held_lock+0x2c/0x110 [ 2583.206437] ? __kernfs_new_node+0x2ad/0x860 [ 2583.207086] ? lock_downgrade+0x6d0/0x6d0 [ 2583.207696] ? rwlock_bug.part.0+0x90/0x90 [ 2583.208330] security_kernfs_init_security+0x4e/0xb0 [ 2583.209085] __kernfs_new_node+0x531/0x860 [ 2583.209693] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2583.210406] ? cpumask_next+0x1f/0x30 [ 2583.210968] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2583.211638] ? pcpu_alloc+0x12a/0x1240 [ 2583.212228] kernfs_new_node+0x18d/0x250 [ 2583.212852] kernfs_create_dir_ns+0x49/0x160 [ 2583.213510] cgroup_mkdir+0x318/0xf50 [ 2583.214068] ? cgroup_destroy_locked+0x710/0x710 [ 2583.214777] kernfs_iop_mkdir+0x14d/0x1e0 [ 2583.215393] vfs_mkdir+0x493/0x700 [ 2583.215933] do_mkdirat+0x150/0x2b0 [ 2583.216473] ? user_path_create+0xf0/0xf0 [ 2583.217068] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2583.217848] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2583.218579] do_syscall_64+0x33/0x40 [ 2583.219108] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2583.219852] RIP: 0033:0x7f466d9b7b19 [ 2583.220392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2583.223086] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2583.224159] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2583.225183] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2583.226203] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2583.227250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2583.228296] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:49:18 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = geteuid() ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0xfffffffffffffffe, 0x0, 0x2, @buffer={0x0, 0x1000, &(0x7f0000000340)=""/4096}, &(0x7f0000000080), &(0x7f00000000c0)=""/63, 0x8, 0x6, 0x3, &(0x7f0000000100)}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001500), 0x400400, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000001780)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001740)={&(0x7f0000001580)=@updsa={0x1a4, 0x1a, 0x400, 0x70bd28, 0x25dfdbfb, {{@in=@loopback, @in=@multicast2, 0x4e22, 0x40, 0x4e20, 0x200, 0x2, 0xa0, 0xa0, 0x2b, 0x0, r1}, {@in=@private=0xa010101, 0x4d4, 0xff}, @in=@private=0xa010100, {0x3, 0x9, 0x80, 0x9, 0x3, 0x8, 0x80, 0x9}, {0x3, 0x2, 0x221, 0x100000001}, {0x6, 0x10000, 0x10001}, 0x70bd25, 0x3502, 0xa, 0x1, 0x0, 0x2}, [@replay_esn_val={0x20, 0x17, {0x1, 0x70bd2a, 0x70bd29, 0x70bd25, 0x70bd29, 0x1, [0x8]}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x6}, @mark={0xc, 0x15, {0x350759, 0xfffff418}}, @coaddr={0x14, 0xe, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, @algo_comp={0x48, 0x3, {{'lzs\x00'}}}, @offload={0xc, 0x1c, {0x0, 0x7}}, @tfcpad={0x8, 0x16, 0x8}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x8001}, @replay_thresh={0x8, 0xb, 0x80000000}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x10}, 0x40000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) setresuid(r4, r2, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) sendmsg$sock(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x7, @mcast1, 0x1f, 0x3}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="d10573b06ddf4a017e4859c918588ab49e01b2661190b13284270a4bbbd3f0a96118f70b828d0e6adb71f24c", 0x2c}], 0x1, &(0x7f00000013c0)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0xf3e}}], 0x78}, 0x80) 17:49:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x4}], 0x1, 0x0) 17:49:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x40000}}], 0x7ffff000, 0x0) 17:49:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="20000fff80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:18 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) ioctl$SG_IO(r0, 0x2285, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000240)={{0x1, 0x1, 0x18}, './file0\x00'}) readv(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000040)=""/96, 0x60}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000280)=""/143, 0x8f}, {&(0x7f0000000440)=""/231, 0xe7}, {&(0x7f0000000340)=""/45, 0x2d}, {&(0x7f0000000380)=""/49, 0x31}, {&(0x7f0000000540)=""/33, 0x21}, {&(0x7f0000000580)=""/7, 0x7}], 0x9) r1 = openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x204242, 0x0, 0x6}, 0x18) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x4a890, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$HIDIOCSUSAGES(0xffffffffffffffff, 0x501c4814, &(0x7f0000001e00)={{0x2, 0xffffffff, 0x8, 0x9d7, 0x7}, 0x278, [0x1, 0x10001, 0x5, 0x9, 0x0, 0x52, 0x7, 0x3, 0x7ff, 0x0, 0x51d, 0xfffffffd, 0x84, 0x80000001, 0x3, 0x9, 0x0, 0xffffc5b3, 0x4, 0x2, 0x9, 0x0, 0x8, 0x3ff, 0x0, 0x4, 0x4235, 0x10001, 0x1, 0x365a, 0x80000001, 0x308000, 0x1, 0xfd0, 0x3428, 0x7, 0x5, 0x8, 0x1, 0x800, 0x6, 0x1, 0xf94, 0x6, 0x4, 0x10000, 0x0, 0xfffffc01, 0x6, 0x5, 0x2, 0x101, 0x1cc, 0x5e, 0x6, 0x5, 0x1d5c, 0xfffffff7, 0x2, 0x0, 0xfff, 0x200, 0x4, 0x7, 0x401, 0x7, 0x529, 0x1000, 0x100, 0x8e06, 0x5e43, 0x800, 0x80000000, 0x6, 0x80000000, 0x5, 0x3, 0x6, 0x1, 0x1, 0x800, 0x5, 0x7f, 0xeb6, 0xff, 0x97, 0x9, 0x10000, 0x1, 0x5, 0x7, 0x7, 0x7, 0x4, 0xe9, 0x2, 0x3f, 0x5, 0x3, 0x38000000, 0x1, 0x3, 0xc00, 0x3, 0xfffffff8, 0x7fff, 0xff, 0x8, 0x8, 0x1f, 0x9, 0xec, 0x4, 0x0, 0x7, 0x0, 0xc911, 0x2620, 0x2, 0xac0, 0x6, 0x800, 0x7, 0x3f, 0x8000, 0xffff, 0x6, 0x1, 0xffffff01, 0x5add, 0x8b2, 0x3, 0x82, 0x9, 0xffff, 0x4, 0x3, 0x20, 0x0, 0x4, 0x9, 0x3, 0x2f89, 0x9, 0xff, 0x9, 0x101, 0x8001, 0x9, 0x6590, 0x8, 0x5, 0x0, 0x4, 0x7fffffff, 0x8, 0x1, 0x8, 0x3, 0xffff, 0xfffffff8, 0x81, 0x6, 0x7, 0x77d0f6a4, 0x3, 0x5, 0x4, 0x6, 0x5, 0x9, 0x3, 0x9, 0x80000000, 0x1ff, 0x8, 0x9, 0xc3, 0xf, 0x0, 0xb3, 0x5, 0x80, 0x2a53, 0x8, 0x5, 0x4, 0xffffffff, 0x4, 0xf9d0, 0x2, 0x8000, 0x1, 0x8, 0x8, 0x8001, 0xfef, 0xc03, 0xfffff5a4, 0x0, 0x6, 0x2, 0x0, 0xffff7fff, 0x6, 0x9dd, 0x60, 0x1, 0x0, 0x8, 0x3, 0xb5, 0x10001, 0x7ff, 0x6, 0xff, 0x1ff, 0x200, 0x3, 0x3f0, 0xfffffff8, 0xff, 0x0, 0x1, 0x47b9, 0x7, 0x318, 0xf01, 0x6, 0x7fffffff, 0x7, 0x2, 0x6, 0x100, 0x59, 0x6, 0x7, 0x87, 0x6, 0x401, 0x2, 0x9, 0x3ff, 0x3f, 0x5, 0x312, 0x2, 0x394b, 0x98, 0x101, 0x1ff, 0x5, 0x800, 0x8, 0x3ff, 0x5, 0x80, 0x1, 0x7fff, 0x6, 0x0, 0x9, 0x3, 0x60, 0x0, 0x0, 0x7fffffff, 0x9, 0x6, 0xe2, 0xffff8001, 0x10000, 0xbb2, 0xfff, 0x0, 0x200, 0x7, 0x4, 0x4, 0x5, 0x1, 0x8, 0x7, 0x9, 0x0, 0xffffffe1, 0x40, 0x5, 0x0, 0x0, 0x8, 0x3ff, 0xffff58a0, 0xe2, 0x9, 0x9, 0x6, 0x7, 0x8, 0x8, 0x6, 0x3, 0x10000, 0x2, 0x81, 0x8001, 0x4, 0x8, 0x6, 0x95, 0x1, 0x7fffffff, 0x7, 0x2, 0xff, 0xfd49, 0x6, 0x8, 0x1ff, 0x1, 0x0, 0x80000040, 0x1, 0x10000, 0x9, 0x3ff, 0xfffff44b, 0x5, 0xfff, 0x7, 0x800, 0x1, 0x4, 0x1, 0xf1, 0x80000000, 0x3f, 0x4, 0x9, 0xc0eb, 0x1, 0xb2, 0xb, 0x0, 0x80000000, 0xffffffff, 0x3, 0x3, 0xffffffff, 0x200, 0xffff0001, 0x3f, 0x6, 0x1000, 0xf5f1, 0x8, 0xe636, 0xfffffffb, 0xd3, 0xfff, 0x0, 0x401, 0x1, 0xc0a2, 0x80000000, 0x2, 0x6, 0x10001, 0x1, 0x0, 0x1, 0x6, 0x2, 0x3ff, 0x10001, 0x2b, 0x1, 0x4, 0x8, 0x2749, 0x7fffffff, 0x0, 0x3, 0x1, 0x3f, 0x20, 0x8, 0x6, 0x9, 0x1, 0x8001, 0x800, 0x7, 0x7fffffff, 0xffffb149, 0x1ff, 0x5, 0x4, 0xfffffff7, 0x3c8, 0x6, 0x9, 0xffffffff, 0x9, 0x5, 0x7, 0x80, 0xa3e, 0xffffffff, 0xfffffff8, 0x9, 0x7cd, 0x1, 0x1, 0x6, 0x6, 0x5, 0x1, 0xfff, 0x20, 0x7, 0x0, 0x5d, 0x7fff, 0x10001, 0x4, 0x76, 0x1, 0x0, 0x2, 0x10001, 0xfc8, 0xffff, 0x3ff, 0x0, 0x1, 0xffff, 0x2, 0x6, 0x401, 0x0, 0x4, 0x81, 0x0, 0x8, 0x40, 0x4, 0x1a3, 0x10001, 0x5, 0xffff, 0x80000000, 0x5, 0x1f, 0x3f, 0x8, 0x7, 0x0, 0xb442439, 0x400, 0x200, 0x8, 0x4d3a, 0x0, 0x7, 0x7, 0x8, 0x80000001, 0x0, 0xfff, 0x7b, 0x10000, 0x7, 0x1, 0x4, 0xfff, 0x3, 0x0, 0x0, 0x2, 0x80000, 0x401, 0xfffffff7, 0xe958, 0xbd, 0x8, 0x6, 0x4, 0x2000, 0x6, 0x400, 0x993, 0x73280000, 0x3, 0x0, 0x5, 0x3585, 0x1, 0x101, 0x8, 0x7, 0xb167, 0xffff, 0x7f, 0x7, 0x80, 0x8001, 0xf362, 0x7f, 0x6, 0x42, 0x4, 0x0, 0x2, 0x3, 0xce, 0x8, 0x9, 0x3, 0x31, 0x400, 0x1f, 0x3, 0x83, 0x6, 0x0, 0x9, 0x4, 0x101, 0x7f, 0x8, 0xbcd0, 0x5, 0x100, 0x2, 0x1, 0x1f, 0x800, 0x401, 0x5, 0xfffffffc, 0x7, 0x4bd, 0x2, 0x0, 0xfffffffa, 0x8, 0x3, 0x100, 0x62, 0x7, 0x6, 0xee, 0x3ff, 0x1f, 0xcf8, 0x101, 0x8, 0x9c2, 0x852, 0x4, 0x7fffffff, 0xab42, 0x40, 0x9, 0x1000, 0x5, 0x9, 0x80000000, 0x7eab, 0x6, 0x0, 0x4, 0x7ff, 0xf05d, 0x5, 0x10000, 0x1, 0x6, 0x7fff, 0x1, 0x9, 0x8001, 0x480, 0x0, 0x10000, 0xfff, 0x5, 0x5, 0x7, 0x4, 0x3, 0x0, 0x81, 0x5, 0x9, 0x101, 0x2, 0x8, 0x80000001, 0x6, 0xb0, 0x6, 0x200, 0x1, 0x4, 0x8, 0x3ff, 0xfffffffa, 0x9, 0x6, 0x10001, 0x5, 0x6, 0x8a92, 0x5, 0xfff, 0x3, 0xfffffff9, 0x5, 0x1f, 0x9, 0x3, 0x1, 0x685, 0x3ff, 0x81, 0x100, 0x0, 0x57, 0xffff33e5, 0x0, 0x2, 0x81, 0x4, 0x9, 0xfffff5e2, 0x2, 0xd4a, 0x1, 0x401, 0x2, 0x3bcb, 0x8, 0x952, 0xffff, 0x73, 0x4, 0x0, 0x8001, 0x0, 0xffffff7f, 0x7, 0x3, 0x804, 0x8000, 0x1d3, 0xfffffffc, 0x3, 0x1, 0x1c, 0x40, 0x5, 0x8, 0x1, 0x5e, 0x8000, 0x2, 0xb8b, 0x1ff, 0xd3bb, 0x1, 0xfffffffc, 0x3f, 0x6, 0x0, 0x3f, 0xfffffff9, 0xfe88, 0x7, 0x4, 0x10001, 0x5, 0x6, 0x6, 0x4, 0x9, 0x2, 0x6, 0x7, 0x2, 0x1, 0x2, 0x290148e4, 0x401, 0x5, 0x7f, 0x5, 0x4, 0x1ff, 0x100, 0x40, 0x3, 0x303bc550, 0xffff8b0f, 0x2, 0x6, 0x6, 0xffffffff, 0x0, 0xfffffe00, 0x9, 0x1, 0x7fffffff, 0x4, 0x8, 0x7, 0x7fff, 0x7, 0x3, 0x7ff, 0x3, 0xa4, 0xfffffffb, 0x5, 0x101, 0x20, 0x7, 0xfd, 0x0, 0x80, 0x8d8c, 0xffffff20, 0x3, 0x1, 0x7, 0x8, 0x0, 0x7, 0x7fffffff, 0x4, 0x64bc, 0x5, 0x1bf, 0x3, 0x400, 0x0, 0x7, 0x0, 0x422, 0x218, 0x7f, 0x9a8e, 0xd, 0x1, 0x7fffffff, 0x8, 0xffff, 0x40, 0xab3, 0x0, 0x2, 0x80000000, 0x7, 0x9, 0x6, 0x101, 0x40, 0x800, 0x4, 0x80000000, 0x6, 0x40, 0x3f, 0x4, 0x4, 0x20, 0x7, 0x9, 0x9, 0x800, 0x55e4, 0x4, 0x80000000, 0x40, 0x1, 0x200, 0x4d3, 0x69, 0x1, 0x6, 0x1f, 0x9, 0x48900000, 0x1, 0x3ff, 0x2, 0xea8, 0x1ff, 0x8, 0x4, 0x26e, 0x0, 0x6, 0x6, 0x0, 0x7fffffff, 0x7, 0xcd, 0x80, 0x6, 0x9, 0x9, 0x1ff, 0x200, 0x80000000, 0x71712a1b, 0x1, 0x6, 0xfcc, 0x8, 0x7, 0x400, 0x1, 0x8001, 0x100, 0x9, 0xffff, 0x4, 0x1, 0x1000000, 0x3, 0x1, 0x59, 0x200, 0x9, 0x200, 0x80, 0x8, 0x10000, 0x100, 0x8, 0x418f5b16, 0x9, 0x2, 0x1, 0x5, 0x5, 0x5, 0x1000, 0x4, 0x800, 0x90, 0xffffffff, 0x1, 0x40, 0xae1, 0x2, 0xfffffffb, 0x3, 0x800, 0x7, 0x5, 0x10001, 0xa2d1, 0x6ec7, 0x0, 0x0, 0x1, 0x7fffffff, 0x4, 0x7, 0x200, 0x7db, 0x2, 0x3, 0x0, 0x9, 0xff, 0x1, 0x4, 0x21, 0x1000, 0x7, 0x7fff, 0x1, 0x7, 0x0, 0x5c, 0xada50c5, 0x7, 0x4, 0xe000, 0x9, 0x6, 0x8000, 0x8001, 0x7f, 0x9e7, 0x20, 0x80, 0x2, 0x6, 0x80000001, 0x8, 0xfffffffe, 0xc0, 0x8000, 0x6, 0xfffff801, 0x6, 0x0, 0x4, 0x6, 0x1ff, 0x0, 0x200, 0x80000001, 0x4, 0x100, 0x9, 0x9, 0x4, 0xfffffffc, 0x39, 0x3f, 0xfffffffe, 0x1, 0x8, 0x7, 0x9, 0x9, 0x10000, 0x4, 0x4, 0x1, 0x5, 0x6, 0x3, 0x8, 0x0, 0x9, 0x5, 0x29f, 0x3b, 0x200, 0x3, 0x9, 0x7, 0x3, 0x8d80, 0x6, 0xffffffff, 0x6, 0x3ff, 0x9c, 0x0, 0x7, 0x28, 0x2, 0x1, 0x2, 0x4, 0xfbd, 0x3f, 0x5, 0xfffffffa, 0x5, 0x0, 0x3, 0x7, 0xf2, 0xa6c, 0x7ff, 0x7, 0x800, 0xffff, 0x7fffffff, 0x10000, 0xe9c1, 0x4, 0x1, 0x2ac6, 0x4fc84f47, 0x0, 0x81, 0x7fff, 0xfffffff9, 0x4, 0xe52, 0x6, 0x7, 0x0, 0x3, 0x3, 0x8c, 0x0, 0x8f, 0x7, 0x401, 0x7, 0x4e6, 0x8, 0x6, 0x4, 0x0, 0x401, 0x2, 0xac9, 0x97f, 0x4, 0x5, 0x7f, 0x10001, 0x8, 0x3, 0x9, 0x0, 0x568a6ff4, 0x7, 0x100000, 0x0, 0x1, 0x6e76]}) fallocate(r3, 0x40, 0x4000000000000800, 0xffffffff) r5 = openat(r1, &(0x7f0000000100)='./file0\x00', 0x100, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r2, {0x7fff}}, './file0\x00'}) r6 = fcntl$dupfd(r0, 0x0, r3) writev(r6, &(0x7f00000003c0)=[{&(0x7f0000000000)="0000abe02400030021206cda3b5e5672b89aeddb2a535fbd0706006dff0043a9d7cceb232fb81bf74ebdd05b7677", 0x2e}, {&(0x7f0000000680)="7fd41c04550300020000000000000000010046e92ed2616f72657d044129471d4fd47924fd0900e09e0068deec025f2400113680b0eb4d4627baf31afc6413da00240bc010c515c4", 0x48}], 0x2) 17:49:18 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 25) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:49:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (fail_nth: 5) 17:49:18 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)={0x1c, 0x10, 0x0, 0x0, 0x0, 0x0, {}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) r3 = socket(0x2a, 0x1, 0x9966) getsockname(r3, &(0x7f00000001c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x80) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x0, 0x40) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r6, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r6, 0x0, 0x0) r7 = syz_genetlink_get_family_id$ipvs(0x0, r6) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRES16=r7, @ANYBLOB="6131e6afecb32e24820bfaf1375895611c549cb1ff0f005031e8f2fab76be54f0f33304588b78c933acaf2ee0cc846861ad47052fccf176e13339f2885eb6cce5e85fc75c2261ca3afe40686eef795b58cc67031a4fb70e5"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r5, &(0x7f0000001a00)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000019c0)={&(0x7f0000001900)={0x84, r7, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@private=0xa010100}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x15}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8001}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xf6}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x44000}, 0x4000810) ioctl$AUTOFS_IOC_SETTIMEOUT(r4, 0x80049367, &(0x7f0000000100)=0x10000) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000080)={0x5c7, 0x506, 0x1, 0x0, 0x0, [{{r4}, 0xe33}]}) [ 2598.192852] FAULT_INJECTION: forcing a failure. [ 2598.192852] name failslab, interval 1, probability 0, space 0, times 0 [ 2598.194748] CPU: 0 PID: 18286 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 2598.195743] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2598.196929] Call Trace: [ 2598.197318] dump_stack+0x107/0x167 [ 2598.197848] should_fail.cold+0x5/0xa [ 2598.198412] ? create_object.isra.0+0x3a/0xa20 [ 2598.199081] should_failslab+0x5/0x20 [ 2598.199631] kmem_cache_alloc+0x5b/0x310 [ 2598.200225] create_object.isra.0+0x3a/0xa20 [ 2598.200861] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2598.201616] kmem_cache_alloc_trace+0x151/0x320 [ 2598.202303] ? _copy_from_user+0xfb/0x1b0 [ 2598.202907] copy_mount_options+0x55/0x180 [ 2598.203525] __x64_sys_mount+0x1a8/0x300 [ 2598.204113] ? copy_mnt_ns+0xa00/0xa00 [ 2598.204676] ? copy_mnt_ns+0xa00/0xa00 [ 2598.205250] do_syscall_64+0x33/0x40 [ 2598.205790] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2598.206538] RIP: 0033:0x7ff76506eb19 [ 2598.207079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2598.209755] RSP: 002b:00007ff7625e4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2598.210856] RAX: ffffffffffffffda RBX: 00007ff765181f60 RCX: 00007ff76506eb19 [ 2598.211883] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2598.212931] RBP: 00007ff7625e41d0 R08: 0000000020000100 R09: 0000000000000000 [ 2598.213970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2598.215008] R13: 00007ffd6a1299cf R14: 00007ff7625e4300 R15: 0000000000022000 [ 2598.228363] FAULT_INJECTION: forcing a failure. [ 2598.228363] name failslab, interval 1, probability 0, space 0, times 0 [ 2598.230236] CPU: 0 PID: 18285 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2598.231229] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2598.232426] Call Trace: [ 2598.232825] dump_stack+0x107/0x167 [ 2598.233354] should_fail.cold+0x5/0xa [ 2598.233909] ? create_object.isra.0+0x3a/0xa20 [ 2598.234587] should_failslab+0x5/0x20 [ 2598.235139] kmem_cache_alloc+0x5b/0x310 [ 2598.235730] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2598.236430] create_object.isra.0+0x3a/0xa20 [ 2598.237073] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2598.237814] __kmalloc+0x16e/0x390 [ 2598.238366] selinux_kernfs_init_security+0x137/0x4c0 [ 2598.239129] ? selinux_file_mprotect+0x610/0x610 [ 2598.239814] ? find_held_lock+0x2c/0x110 [ 2598.240423] ? __kernfs_new_node+0x2ad/0x860 [ 2598.241069] ? lock_downgrade+0x6d0/0x6d0 [ 2598.241681] ? rwlock_bug.part.0+0x90/0x90 [ 2598.242313] security_kernfs_init_security+0x4e/0xb0 [ 2598.243062] __kernfs_new_node+0x531/0x860 [ 2598.243688] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2598.244380] ? cpumask_next+0x1f/0x30 [ 2598.244935] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2598.245635] ? pcpu_alloc+0x12a/0x1240 [ 2598.246226] kernfs_new_node+0x18d/0x250 [ 2598.246832] kernfs_create_dir_ns+0x49/0x160 [ 2598.247475] cgroup_mkdir+0x318/0xf50 [ 2598.248044] ? cgroup_destroy_locked+0x710/0x710 [ 2598.248746] kernfs_iop_mkdir+0x14d/0x1e0 [ 2598.249359] vfs_mkdir+0x493/0x700 [ 2598.249879] do_mkdirat+0x150/0x2b0 [ 2598.250431] ? user_path_create+0xf0/0xf0 [ 2598.251056] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2598.251820] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2598.252570] do_syscall_64+0x33/0x40 [ 2598.253113] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2598.253846] RIP: 0033:0x7f466d9b7b19 [ 2598.254396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2598.257059] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2598.258173] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2598.259208] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2598.260249] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2598.261294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2598.262340] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:49:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000400000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x3a1102, 0x0) r2 = openat(r0, 0x0, 0x100, 0x2) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x7fff, 0x2) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) readv(r4, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:49:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x5}], 0x1, 0x0) 17:49:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000070000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:18 executing program 5: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:49:33 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 26) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:49:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x6}], 0x1, 0x0) 17:49:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x200000}}], 0x7ffff000, 0x0) 17:49:33 executing program 3: pread64(0xffffffffffffffff, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) listen(0xffffffffffffffff, 0x3) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa0000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c000000000901040000000000000000030000070900010073797a300000000008000340000000000800020006000340000400000c000280050001002f00000008000340000000060c0004800800017921c0c640000000080800054000"/108], 0x6c}, 0x1, 0x0, 0x0, 0x4010}, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffff9c, 0xc0506617, &(0x7f00000001c0)={@id={0x2, 0x0, @d}, 0x1, 0x0, '\x00', @auto=[0x36]}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x7fffffff, 0x1, 0x80, 0x80000000, 0x9606}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x28, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@nested={0x14, 0x11, 0x0, 0x1, [@generic="809801a7b0c7dba09475f251c743092f"]}]}, 0x28}}, 0x0) 17:49:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="200000007f000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x3498, 0x1f, 0x8, 0x7}, {0x8, 0x1, 0x3}]}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:49:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (fail_nth: 6) 17:49:33 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x2, 0x3, 0x8b30, 0x466, 0xffffffffffffffff}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) [ 2613.366120] FAULT_INJECTION: forcing a failure. [ 2613.366120] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2613.368902] CPU: 1 PID: 18328 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 2613.369915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2613.371117] Call Trace: [ 2613.371517] dump_stack+0x107/0x167 [ 2613.372052] should_fail.cold+0x5/0xa [ 2613.372621] _copy_from_user+0x2e/0x1b0 [ 2613.373214] copy_mount_options+0x76/0x180 [ 2613.373843] __x64_sys_mount+0x1a8/0x300 [ 2613.374445] ? copy_mnt_ns+0xa00/0xa00 [ 2613.375023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2613.375791] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2613.376545] do_syscall_64+0x33/0x40 [ 2613.377089] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2613.377836] RIP: 0033:0x7ff76506eb19 [ 2613.378386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2613.381028] RSP: 002b:00007ff7625e4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2613.382136] RAX: ffffffffffffffda RBX: 00007ff765181f60 RCX: 00007ff76506eb19 [ 2613.383171] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2613.384198] RBP: 00007ff7625e41d0 R08: 0000000020000100 R09: 0000000000000000 [ 2613.385225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2613.386254] R13: 00007ffd6a1299cf R14: 00007ff7625e4300 R15: 0000000000022000 [ 2613.408497] FAULT_INJECTION: forcing a failure. [ 2613.408497] name failslab, interval 1, probability 0, space 0, times 0 [ 2613.410583] CPU: 0 PID: 18329 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2613.411594] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2613.412795] Call Trace: [ 2613.413191] dump_stack+0x107/0x167 [ 2613.413720] should_fail.cold+0x5/0xa [ 2613.414288] should_failslab+0x5/0x20 [ 2613.414851] __kmalloc_track_caller+0x79/0x370 [ 2613.415513] ? security_context_to_sid_core+0xb4/0x890 [ 2613.416275] kmemdup_nul+0x2d/0xa0 [ 2613.416792] security_context_to_sid_core+0xb4/0x890 [ 2613.417529] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 2613.418330] ? do_raw_spin_lock+0x121/0x260 [ 2613.418981] ? rwlock_bug.part.0+0x90/0x90 [ 2613.419598] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2613.420303] ? do_raw_spin_unlock+0x4f/0x220 [ 2613.420946] ? _raw_spin_unlock+0x1a/0x30 [ 2613.421558] security_context_to_sid+0x35/0x50 [ 2613.422229] selinux_kernfs_init_security+0x19d/0x4c0 [ 2613.422979] ? selinux_file_mprotect+0x610/0x610 [ 2613.423664] ? find_held_lock+0x2c/0x110 [ 2613.424272] ? __kernfs_new_node+0x2ad/0x860 [ 2613.424921] ? lock_downgrade+0x6d0/0x6d0 [ 2613.425524] ? rwlock_bug.part.0+0x90/0x90 [ 2613.426145] security_kernfs_init_security+0x4e/0xb0 [ 2613.426897] __kernfs_new_node+0x531/0x860 [ 2613.427515] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2613.428198] ? cpumask_next+0x1f/0x30 [ 2613.428766] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2613.429448] ? pcpu_alloc+0x12a/0x1240 [ 2613.430034] kernfs_new_node+0x18d/0x250 [ 2613.430662] kernfs_create_dir_ns+0x49/0x160 [ 2613.431312] cgroup_mkdir+0x318/0xf50 [ 2613.431870] ? cgroup_destroy_locked+0x710/0x710 [ 2613.432563] kernfs_iop_mkdir+0x14d/0x1e0 [ 2613.433166] vfs_mkdir+0x493/0x700 [ 2613.433714] do_mkdirat+0x150/0x2b0 [ 2613.434246] ? user_path_create+0xf0/0xf0 [ 2613.434872] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2613.435628] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2613.436372] do_syscall_64+0x33/0x40 [ 2613.436930] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2613.437677] RIP: 0033:0x7f466d9b7b19 [ 2613.438215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2613.440894] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2613.442003] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2613.443033] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2613.444074] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2613.445112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2613.446130] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:49:33 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x3a1102, 0x0) r4 = openat(r2, 0x0, 0x100, 0x2) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendfile(r4, r5, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$SCSI_IOCTL_GET_IDLUN(r3, 0x5382, &(0x7f0000000040)) 17:49:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_STATX={0x15, 0x5, 0x0, 0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000000c0)='./file0\x00', 0x100, 0x2000, 0x1}, 0x8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x130000, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c756e61ea136a51d09329db73672373b0636163686e6f6e652c7569643d0000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=/dev/sg#\x00,euid=', @ANYRESDEC=r2, @ANYBLOB=',\x00']) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:49:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000280000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ftruncate(0xffffffffffffffff, 0xf15) openat(0xffffffffffffffff, &(0x7f0000001740)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0xd, 0x80010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r4, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x50) sendfile(0xffffffffffffffff, r5, 0x0, 0x100000001) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1, 0x0, 0x1f, 0x3f, 0x0, 0x8, 0x46200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x30, 0x3}, 0x4c5, 0x20, 0x0, 0x8, 0x4, 0x2, 0x0, 0x0, 0x7fff, 0x0, 0x100000001}, 0xffffffffffffffff, 0x4, r5, 0x2) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) r7 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000040)=@IORING_OP_READ_FIXED={0x4, 0x3, 0x4007, @fd=r7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x1, {0x1, r6}}, 0x0) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00'}) syslog(0x2, &(0x7f00000002c0)=""/129, 0x81) 17:49:33 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) setxattr$incfs_metadata(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)="457e23454cdb16c826d4abda7d3c2ec29b5cef7ffd596f835a789a01c0a46904bdea1e1df4007fc76eb702102ea6b566f2af2d6d61ea9c4c4f2c634cf81ae6fd6a21ff64f3fad834d1a4655b8e4228a54f20", 0x52, 0x2) lstat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) lchown(&(0x7f0000000040)='./file0\x00', r1, r3) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='./file0\x00') 17:49:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x0) 17:49:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000380000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:33 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 27) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') [ 2613.717292] FAULT_INJECTION: forcing a failure. [ 2613.717292] name failslab, interval 1, probability 0, space 0, times 0 [ 2613.718432] CPU: 0 PID: 18354 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2613.718942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2613.719559] Call Trace: [ 2613.719764] dump_stack+0x107/0x167 [ 2613.720034] should_fail.cold+0x5/0xa [ 2613.720321] ? create_object.isra.0+0x3a/0xa20 [ 2613.720683] should_failslab+0x5/0x20 [ 2613.720973] kmem_cache_alloc+0x5b/0x310 [ 2613.721280] create_object.isra.0+0x3a/0xa20 [ 2613.721620] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2613.722003] __kmalloc_track_caller+0x177/0x370 [ 2613.722361] ? security_context_to_sid_core+0xb4/0x890 [ 2613.722764] kmemdup_nul+0x2d/0xa0 [ 2613.723041] security_context_to_sid_core+0xb4/0x890 [ 2613.723439] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 2613.723860] ? do_raw_spin_lock+0x121/0x260 [ 2613.724186] ? rwlock_bug.part.0+0x90/0x90 [ 2613.724511] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2613.724870] ? do_raw_spin_unlock+0x4f/0x220 [ 2613.725195] ? _raw_spin_unlock+0x1a/0x30 [ 2613.725514] security_context_to_sid+0x35/0x50 [ 2613.725854] selinux_kernfs_init_security+0x19d/0x4c0 [ 2613.726233] ? selinux_file_mprotect+0x610/0x610 [ 2613.726614] ? find_held_lock+0x2c/0x110 [ 2613.726930] ? __kernfs_new_node+0x2ad/0x860 [ 2613.727252] ? lock_downgrade+0x6d0/0x6d0 [ 2613.727594] ? rwlock_bug.part.0+0x90/0x90 [ 2613.727922] security_kernfs_init_security+0x4e/0xb0 [ 2613.728296] __kernfs_new_node+0x531/0x860 [ 2613.728624] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2613.728974] ? cpumask_next+0x1f/0x30 [ 2613.729253] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2613.729607] ? pcpu_alloc+0x12a/0x1240 [ 2613.729902] kernfs_new_node+0x18d/0x250 [ 2613.730214] kernfs_create_dir_ns+0x49/0x160 [ 2613.730573] cgroup_mkdir+0x318/0xf50 [ 2613.730872] ? cgroup_destroy_locked+0x710/0x710 [ 2613.731244] kernfs_iop_mkdir+0x14d/0x1e0 [ 2613.731569] vfs_mkdir+0x493/0x700 [ 2613.731849] do_mkdirat+0x150/0x2b0 [ 2613.732121] ? user_path_create+0xf0/0xf0 [ 2613.732451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2613.732850] do_syscall_64+0x33/0x40 [ 2613.733127] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2613.733520] RIP: 0033:0x7f466d9b7b19 [ 2613.733812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2613.735168] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2613.735741] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2613.736263] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2613.736797] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2613.737323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2613.737861] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:49:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x0) 17:49:49 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x4, 0x1f1000) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000240)=@v1={0x1000000, [{0x1e}]}, 0xc, 0x1) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:49:49 executing program 5: unlink(&(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:49:50 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 28) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:49:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000480000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (fail_nth: 7) 17:49:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ftruncate(0xffffffffffffffff, 0xf15) openat(0xffffffffffffffff, &(0x7f0000001740)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0xd, 0x80010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r4, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x50) sendfile(0xffffffffffffffff, r5, 0x0, 0x100000001) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1, 0x0, 0x1f, 0x3f, 0x0, 0x8, 0x46200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x30, 0x3}, 0x4c5, 0x20, 0x0, 0x8, 0x4, 0x2, 0x0, 0x0, 0x7fff, 0x0, 0x100000001}, 0xffffffffffffffff, 0x4, r5, 0x2) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) r7 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000040)=@IORING_OP_READ_FIXED={0x4, 0x3, 0x4007, @fd=r7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x1, {0x1, r6}}, 0x0) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00'}) syslog(0x2, &(0x7f00000002c0)=""/129, 0x81) 17:49:50 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x400300}}], 0x7ffff000, 0x0) [ 2630.157403] FAULT_INJECTION: forcing a failure. [ 2630.157403] name failslab, interval 1, probability 0, space 0, times 0 [ 2630.159101] CPU: 1 PID: 18578 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2630.159880] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2630.160806] Call Trace: [ 2630.161115] dump_stack+0x107/0x167 [ 2630.161526] should_fail.cold+0x5/0xa [ 2630.161972] should_failslab+0x5/0x20 [ 2630.162403] __kmalloc_track_caller+0x79/0x370 [ 2630.162917] ? sidtab_sid2str_get+0x17e/0x720 [ 2630.163424] kmemdup+0x23/0x50 [ 2630.163783] sidtab_sid2str_get+0x17e/0x720 [ 2630.164267] sidtab_entry_to_string+0x33/0x110 [ 2630.164789] security_sid_to_context_core+0x33c/0x5d0 [ 2630.164834] FAULT_INJECTION: forcing a failure. [ 2630.164834] name failslab, interval 1, probability 0, space 0, times 0 [ 2630.165363] selinux_kernfs_init_security+0x239/0x4c0 [ 2630.167560] ? selinux_file_mprotect+0x610/0x610 [ 2630.168095] ? find_held_lock+0x2c/0x110 [ 2630.168551] ? __kernfs_new_node+0x2ad/0x860 [ 2630.169060] ? rwlock_bug.part.0+0x90/0x90 [ 2630.169545] security_kernfs_init_security+0x4e/0xb0 [ 2630.170116] __kernfs_new_node+0x531/0x860 [ 2630.170604] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2630.171139] ? cpumask_next+0x1f/0x30 [ 2630.171571] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2630.172093] ? pcpu_alloc+0x12a/0x1240 [ 2630.172547] kernfs_new_node+0x18d/0x250 [ 2630.173017] kernfs_create_dir_ns+0x49/0x160 [ 2630.173514] cgroup_mkdir+0x318/0xf50 [ 2630.173954] ? cgroup_destroy_locked+0x710/0x710 [ 2630.174485] kernfs_iop_mkdir+0x14d/0x1e0 [ 2630.174958] vfs_mkdir+0x493/0x700 [ 2630.175358] do_mkdirat+0x150/0x2b0 [ 2630.175779] ? user_path_create+0xf0/0xf0 [ 2630.176251] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2630.176842] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2630.177430] do_syscall_64+0x33/0x40 [ 2630.177856] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2630.178421] RIP: 0033:0x7f466d9b7b19 [ 2630.178855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2630.180887] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2630.181738] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2630.182525] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2630.183321] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2630.184118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2630.184913] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 [ 2630.185743] CPU: 0 PID: 18579 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 2630.186786] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2630.187982] Call Trace: [ 2630.188378] dump_stack+0x107/0x167 [ 2630.188914] should_fail.cold+0x5/0xa [ 2630.189495] ? getname_flags.part.0+0x50/0x4f0 [ 2630.190176] should_failslab+0x5/0x20 [ 2630.190739] kmem_cache_alloc+0x5b/0x310 [ 2630.191346] getname_flags.part.0+0x50/0x4f0 [ 2630.192012] ? _copy_from_user+0xfb/0x1b0 [ 2630.192619] user_path_at_empty+0xa1/0x100 [ 2630.193242] __x64_sys_mount+0x1e9/0x300 [ 2630.193864] ? copy_mnt_ns+0xa00/0xa00 [ 2630.194445] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2630.195211] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2630.195989] do_syscall_64+0x33/0x40 [ 2630.196559] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2630.197307] RIP: 0033:0x7ff76506eb19 [ 2630.197855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2630.200513] RSP: 002b:00007ff7625e4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2630.201622] RAX: ffffffffffffffda RBX: 00007ff765181f60 RCX: 00007ff76506eb19 [ 2630.202654] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2630.203689] RBP: 00007ff7625e41d0 R08: 0000000020000100 R09: 0000000000000000 [ 2630.204711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2630.205738] R13: 00007ffd6a1299cf R14: 00007ff7625e4300 R15: 0000000000022000 17:49:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000580000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:50 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[@ANYRES64=r1], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, 0xffffffffffffffff, 0x0) fcntl$getflags(0xffffffffffffffff, 0x1) r3 = fsmount(r2, 0x0, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(r3, &(0x7f0000001240)='/proc/self/exe\x00', 0x200, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1, @set_cpb={{0x441, 0xb}, {0x8, 0x0, 0x9, 0x998, 0x80, 0x6, 0x8}}}, 0xf) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000002c0)={0x0, 0x1, 0x7, 0x2}) write$bt_hci(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x4c) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x163000, 0x0) unshare(0x40040000) 17:49:50 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) r3 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) 17:49:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0xe}], 0x1, 0x0) 17:49:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000680000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000780000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:49:50 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 29) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:49:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x10}], 0x1, 0x0) 17:49:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (fail_nth: 8) [ 2630.472888] FAULT_INJECTION: forcing a failure. [ 2630.472888] name failslab, interval 1, probability 0, space 0, times 0 [ 2630.475005] CPU: 0 PID: 18661 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2630.476014] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2630.477243] Call Trace: [ 2630.477634] dump_stack+0x107/0x167 [ 2630.478175] should_fail.cold+0x5/0xa [ 2630.478754] ? create_object.isra.0+0x3a/0xa20 [ 2630.479425] should_failslab+0x5/0x20 [ 2630.479978] kmem_cache_alloc+0x5b/0x310 [ 2630.480582] ? sidtab_sid2str_get+0x65/0x720 [ 2630.481229] create_object.isra.0+0x3a/0xa20 [ 2630.481879] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2630.482640] __kmalloc_track_caller+0x177/0x370 [ 2630.483325] ? sidtab_sid2str_get+0x17e/0x720 [ 2630.483993] kmemdup+0x23/0x50 [ 2630.484464] sidtab_sid2str_get+0x17e/0x720 [ 2630.485106] sidtab_entry_to_string+0x33/0x110 [ 2630.485773] security_sid_to_context_core+0x33c/0x5d0 [ 2630.486537] selinux_kernfs_init_security+0x239/0x4c0 [ 2630.487295] ? selinux_file_mprotect+0x610/0x610 [ 2630.487983] ? find_held_lock+0x2c/0x110 [ 2630.488581] ? __kernfs_new_node+0x2ad/0x860 [ 2630.489229] ? rwlock_bug.part.0+0x90/0x90 [ 2630.489853] security_kernfs_init_security+0x4e/0xb0 [ 2630.490601] __kernfs_new_node+0x531/0x860 [ 2630.491223] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2630.491925] ? cpumask_next+0x1f/0x30 [ 2630.492484] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2630.493166] ? pcpu_alloc+0x12a/0x1240 [ 2630.493754] kernfs_new_node+0x18d/0x250 [ 2630.494355] kernfs_create_dir_ns+0x49/0x160 [ 2630.495012] cgroup_mkdir+0x318/0xf50 [ 2630.495583] ? cgroup_destroy_locked+0x710/0x710 [ 2630.496274] kernfs_iop_mkdir+0x14d/0x1e0 [ 2630.496890] vfs_mkdir+0x493/0x700 [ 2630.497419] do_mkdirat+0x150/0x2b0 [ 2630.497955] ? user_path_create+0xf0/0xf0 [ 2630.498571] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2630.499329] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2630.500083] do_syscall_64+0x33/0x40 [ 2630.500627] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2630.501367] RIP: 0033:0x7f466d9b7b19 [ 2630.501914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2630.504550] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2630.505652] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2630.506690] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2630.507725] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2630.508747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2630.509775] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 [ 2630.543296] FAULT_INJECTION: forcing a failure. [ 2630.543296] name failslab, interval 1, probability 0, space 0, times 0 [ 2630.544665] CPU: 1 PID: 18782 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 2630.545313] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2630.546094] Call Trace: [ 2630.546347] dump_stack+0x107/0x167 [ 2630.546693] should_fail.cold+0x5/0xa [ 2630.547047] ? create_object.isra.0+0x3a/0xa20 [ 2630.547470] should_failslab+0x5/0x20 [ 2630.547839] kmem_cache_alloc+0x5b/0x310 [ 2630.548227] create_object.isra.0+0x3a/0xa20 [ 2630.548642] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2630.549129] kmem_cache_alloc+0x159/0x310 [ 2630.549526] getname_flags.part.0+0x50/0x4f0 [ 2630.549951] ? _copy_from_user+0xfb/0x1b0 [ 2630.550337] user_path_at_empty+0xa1/0x100 [ 2630.550735] __x64_sys_mount+0x1e9/0x300 [ 2630.551107] ? copy_mnt_ns+0xa00/0xa00 [ 2630.551485] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2630.551980] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2630.552460] do_syscall_64+0x33/0x40 [ 2630.552821] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2630.553298] RIP: 0033:0x7ff76506eb19 [ 2630.553650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2630.555334] RSP: 002b:00007ff7625e4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2630.556047] RAX: ffffffffffffffda RBX: 00007ff765181f60 RCX: 00007ff76506eb19 [ 2630.556712] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2630.557382] RBP: 00007ff7625e41d0 R08: 0000000020000100 R09: 0000000000000000 [ 2630.558049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2630.558728] R13: 00007ffd6a1299cf R14: 00007ff7625e4300 R15: 0000000000022000 17:50:04 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) mknodat$loop(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x800, 0x1) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:50:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000880000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:50:04 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x1000000}}], 0x7ffff000, 0x0) 17:50:04 executing program 3: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x4010, 0xffffffffffffffff, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="89865e69d78178992ace43029d80cc9a68eb5c1bad5703b2e1b3942133a66ddd9fc119a1f5531fea33158c9f55e0a4acb44c2a6337d63494668ec1c7b694f972307998a1bf39e0d50cb0027959208300109669a620e54bafde110fa54ab8b801383dda8b4ea290cb63fdee1ccc90a9532fc52dc9c7b8b8ff772053697c878d6d5e9f24fd4a89446623671d9198530095ec971613ece5f300df9863006ca928853b942122b55a", 0xa6, 0x4000000, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) fork() 17:50:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x20, 0x1) r2 = syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="400000001e0001000000000000000000fe88000000000000000000000000ac1414bb00000000000000000000000000000000009b2f25317c7d95000087c0c53394ef604b85c6015562c2525d297a0604997060ff1c27b672a83625c4d96b288a469d945c00bd20564727e00de5c842cf256ba8471af16c8da7181d636779eb09666ebafc14ee6cfa35b71b49dd142ce45dbdfc5a1e4184fa83c41f475b1ea59675a1c5f90838c0cf61924a3e145d66bc2c4b1d39656acb1ccae634d4acf82a36214021f88431ab2d23ccc91f88d7d4b23fa4fa75d00950dc14d68d669656ba67b584b0a22a02896df1402da1f9207d8a6ad79fd44707fb2b2d630fdefed302403ee2f1995adb8f45518eac"], 0x40}}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0, 0x100}, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r6, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000140)=0x2000) io_uring_enter(r2, 0x76d3, 0x0, 0x0, 0x0, 0x0) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:50:04 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x11}], 0x1, 0x0) 17:50:04 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 30) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:50:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (fail_nth: 9) 17:50:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:50:04 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)={0x1c, 0x10, 0x0, 0x0, 0x0, 0x0, {}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x20c, 0x0, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x7c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x178, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xe}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xd}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xc}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}]}, 0x20c}, 0x1, 0x0, 0x0, 0x20000000}, 0x48c5) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x110, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa, 0x0, 0x5}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x7}, @CTA_EXPECT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_MASTER={0x48, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_MASK={0x44, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}, @CTA_EXPECT_HELP_NAME={0xb, 0x6, 'amanda\x00'}]}, 0x110}, 0x1, 0x0, 0x0, 0x4000010}, 0x800) [ 2644.214030] FAULT_INJECTION: forcing a failure. [ 2644.214030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2644.216045] CPU: 0 PID: 18837 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 2644.217054] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2644.218248] Call Trace: [ 2644.218646] dump_stack+0x107/0x167 [ 2644.219178] should_fail.cold+0x5/0xa [ 2644.219743] strncpy_from_user+0x34/0x470 [ 2644.220353] getname_flags.part.0+0x95/0x4f0 [ 2644.221008] ? _copy_from_user+0xfb/0x1b0 [ 2644.221635] user_path_at_empty+0xa1/0x100 [ 2644.222261] __x64_sys_mount+0x1e9/0x300 [ 2644.222865] ? copy_mnt_ns+0xa00/0xa00 [ 2644.223438] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2644.224203] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2644.224956] do_syscall_64+0x33/0x40 [ 2644.225499] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2644.226253] RIP: 0033:0x7ff76506eb19 [ 2644.226803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2644.229442] RSP: 002b:00007ff7625e4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2644.230556] RAX: ffffffffffffffda RBX: 00007ff765181f60 RCX: 00007ff76506eb19 [ 2644.231598] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2644.232628] RBP: 00007ff7625e41d0 R08: 0000000020000100 R09: 0000000000000000 [ 2644.233667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2644.234716] R13: 00007ffd6a1299cf R14: 00007ff7625e4300 R15: 0000000000022000 [ 2644.239480] FAULT_INJECTION: forcing a failure. [ 2644.239480] name failslab, interval 1, probability 0, space 0, times 0 [ 2644.242107] CPU: 0 PID: 18826 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2644.243121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2644.244486] Call Trace: [ 2644.244869] dump_stack+0x107/0x167 [ 2644.245402] should_fail.cold+0x5/0xa [ 2644.245959] ? __kernfs_iattrs+0xbc/0x470 [ 2644.246572] should_failslab+0x5/0x20 [ 2644.247143] kmem_cache_alloc+0x5b/0x310 [ 2644.247746] __kernfs_iattrs+0xbc/0x470 [ 2644.248329] kernfs_xattr_set+0x2b/0x80 [ 2644.248920] selinux_kernfs_init_security+0x26d/0x4c0 [ 2644.249663] ? selinux_file_mprotect+0x610/0x610 [ 2644.250343] ? find_held_lock+0x2c/0x110 [ 2644.250964] ? __kernfs_new_node+0x2ad/0x860 [ 2644.251617] ? rwlock_bug.part.0+0x90/0x90 [ 2644.252246] security_kernfs_init_security+0x4e/0xb0 [ 2644.252982] __kernfs_new_node+0x531/0x860 [ 2644.253606] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2644.254294] ? cpumask_next+0x1f/0x30 [ 2644.254857] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2644.255545] ? pcpu_alloc+0x12a/0x1240 [ 2644.256128] kernfs_new_node+0x18d/0x250 [ 2644.256724] kernfs_create_dir_ns+0x49/0x160 [ 2644.257375] cgroup_mkdir+0x318/0xf50 [ 2644.257937] ? cgroup_destroy_locked+0x710/0x710 [ 2644.258636] kernfs_iop_mkdir+0x14d/0x1e0 [ 2644.259236] vfs_mkdir+0x493/0x700 [ 2644.259754] do_mkdirat+0x150/0x2b0 [ 2644.260285] ? user_path_create+0xf0/0xf0 [ 2644.260896] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2644.261648] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2644.262392] do_syscall_64+0x33/0x40 [ 2644.262936] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2644.263672] RIP: 0033:0x7f466d9b7b19 [ 2644.264218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2644.266843] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2644.267947] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2644.268992] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2644.270013] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2644.271042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2644.272062] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:50:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0x80, 0x4, 0x40, 0x0, 0x5, 0x18000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x403, 0xc0b, 0x7fff, 0x0, 0x1, 0x2, 0x5, 0x0, 0x77, 0x0, 0x2}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0)={0x0, 0xfb, 0xf8, 0x1, 0x7, "de3686a90acb579f4eef322314e7eecb", "62f56db08685c5018fbeb040921ae2fecbf5ce24c3d15f50c1a6bbd252784689fb8658afee15da67d641f428624d8735ea10177b61a47eb148cff1e2bdd6b75382bf5f9cc431c6953584dfe2bebbfa01208d6b35acc6b20f85039d7e50da2eccb786a8b64ec5cdf4a02b1b59ef283d0ca08938e09c9f3152349d60d84da71bc1e891c9f30027ff1ed15f6f8140f7091bf49a01ff8a52e6f25bbcbadb6d50dfb65ac65975ce77728c3a744270170d3027c9613284b3db91e39ea2dc92ce72711c14fe943cc66934c661921905c4df4c0d94cc79824624fbeb36b2ce7046d53aa2b554ab"}, 0xf8, 0x2) setresuid(0x0, r1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) getresuid(&(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)) 17:50:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000200)={0x0, 0xfffffffffffffffc, 0x96, 0x18, @buffer={0x0, 0xd, &(0x7f0000000040)=""/13}, &(0x7f0000000080)="bdac5cfb1cfeaa3a58fde713c7af2da66bc6f788588faa946bc45d6e98c30c5d82a917287cebed24dc1ef27837b0916a20d64c5388ed86f1340a3a23c8505840dd2e81abb84456bb0f97ad7efea46ab7e53233ce75ee4dd7058841d77653e9395d33051bc4fc9ad343a7332ade38af2657b784fbeb141421bf149fa922b871d76cd3b62298dedead712ec95f9e2187d20a9b427ca146", &(0x7f0000000140)=""/40, 0x1, 0x10027, 0xffffffffffffffff, &(0x7f00000001c0)}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:50:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000980000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:50:04 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x38}], 0x1, 0x0) 17:50:04 executing program 3: mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x14bf46, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x6, 0x2, 0xc, 0xc, "4cbb66a69173a58703d1e4de362afd07995d596291d9d6498afd5f9817cbb28d3a3e80871f8a9c367a4cf7d9709ff7f2b307770f53c86ed53d0dfff007e16ac8", "57d91397e4ffec9f5b2c108c0016a4a78e0dd0e285657924e5edafc67698b188", [0x8]}) chown(0x0, 0xee00, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) setresuid(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'}) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x21, 0x4, 0xfffffff7, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000940)={{r3}, 0x0, 0x1a, @inherit={0x60, 0x0}, @subvolid=0x4}) 17:50:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (fail_nth: 10) [ 2644.445437] FAULT_INJECTION: forcing a failure. [ 2644.445437] name failslab, interval 1, probability 0, space 0, times 0 [ 2644.446399] CPU: 1 PID: 18965 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 2644.446952] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2644.447614] Call Trace: [ 2644.447841] dump_stack+0x107/0x167 [ 2644.448138] should_fail.cold+0x5/0xa [ 2644.448453] ? alloc_fs_context+0x57/0x840 [ 2644.448797] should_failslab+0x5/0x20 [ 2644.449119] kmem_cache_alloc_trace+0x55/0x320 [ 2644.449494] alloc_fs_context+0x57/0x840 [ 2644.449825] path_mount+0xaa3/0x2120 [ 2644.450134] ? strncpy_from_user+0x9e/0x470 [ 2644.450483] ? finish_automount+0xa90/0xa90 [ 2644.450841] ? getname_flags.part.0+0x1dd/0x4f0 [ 2644.451230] ? _copy_from_user+0xfb/0x1b0 [ 2644.451575] __x64_sys_mount+0x282/0x300 [ 2644.451901] ? copy_mnt_ns+0xa00/0xa00 [ 2644.452220] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2644.452645] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2644.453065] do_syscall_64+0x33/0x40 [ 2644.453369] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2644.453791] RIP: 0033:0x7ff76506eb19 [ 2644.454094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2644.455557] RSP: 002b:00007ff7625e4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2644.456160] RAX: ffffffffffffffda RBX: 00007ff765181f60 RCX: 00007ff76506eb19 [ 2644.456728] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2644.457293] RBP: 00007ff7625e41d0 R08: 0000000020000100 R09: 0000000000000000 [ 2644.457855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2644.458418] R13: 00007ffd6a1299cf R14: 00007ff7625e4300 R15: 0000000000022000 17:50:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000a80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:50:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r5 = creat(0x0, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) clone3(&(0x7f0000000380)={0x20004000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0xb}, &(0x7f0000000200)=""/58, 0x3a, &(0x7f0000000240)=""/170, &(0x7f0000000340)=[0x0, r1, 0x0, r4], 0x4, {r5}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (fail_nth: 11) 17:50:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x2000000}}], 0x7ffff000, 0x0) 17:50:19 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x60}], 0x1, 0x0) 17:50:19 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000780)={'#! ', './file0', [{0x20, '/dev/sg#\x00'}, {0x20, '!'}, {}], 0xa, "f7"}, 0x19) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@mcast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@private}}, &(0x7f0000000900)=0xe8) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000940)=0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) setresuid(r3, r4, r5) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="0100b079d4fe9ff4e8c9e500", @ANYRES32=r6, @ANYBLOB="00000000000000003a09a030674a871cdefbe1a1aacd9d2e2f66696c653000"]) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000700)={0x53, 0xffffffffffffffff, 0xcb, 0x3, @scatter={0x7, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)=""/28, 0x1c}, {&(0x7f0000000080)=""/191, 0xbf}, {&(0x7f0000000140)=""/1, 0x1}, {&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f0000000340)=""/112, 0x70}, {&(0x7f00000002c0)=""/29, 0x1d}, {&(0x7f00000003c0)=""/215, 0xd7}]}, &(0x7f0000000540)="d4bbedabcbf93ef7068c8d35f5f7970b1dc58837901254cc915649bf992efd3acd9878963a3f2bac9f993faed07f1b00fb511b22d64251b553cccdb87e28fb861216a2876217e2159e7265230c7328cd00d51f87c8102de67e5177af255dba89a87c6c7991831752661c5f1b13b647480c13c82ad3de197fe549d9024e11809cf117ace7b0c26ed1ff936a3a18e8bd3409c40bedab4efdbbde99bacee337107816cbc6be3970f40ba4bb90f69d94ac1300f153a9aa0cd4f096388e5069eb7c950836c975e0c06809940823", &(0x7f0000000640)=""/123, 0xffffffff, 0x34, 0x1, &(0x7f00000006c0)}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) 17:50:19 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 31) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:50:19 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000140), 0x5, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) write(r2, &(0x7f0000001640)="6087410b2237ed213233630eb85d483028ade40a2d18c49904be1c9a3f5ae317b18c1f02eb5e112cf0e5625e5be6eceeb00e30c75d41346160e3fdc469d01e5b41fe7485a68327030266f48e225c5ed3aa2cc1541d153c58733d8d3bef96b1c71e7307ce4dea4938977a1b8e685ca8ce6bb3f77809961ef5165dc8ef25343993437efa7c1909058bc2d3dd923f4ba92d55662a274b89414c33f5ad06396f64a52e752b04645d5b6d0907f96eee9ae5860fe3c06d1cf036e708c379a96b8748a982934a37384805933e2a664098739dbda04af0f94307ac26521e3eda9d8bd1e0e00a3dd9be9acde9", 0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r4, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r4, 0xc058671e, &(0x7f00000001c0)={{}, {0x6}, 0x1, 0x0, 0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000340)="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", 0x173, 0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], 0x1160}) setresuid(0x0, r3, 0x0) setresuid(0x0, r1, r1) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) splice(r0, &(0x7f0000000040)=0x6, r0, &(0x7f0000000080), 0x0, 0x5) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000000)) 17:50:19 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_gettime(0x0, &(0x7f00000002c0)) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x2, 0x3, 0x6c1b7bf7ffd9560f, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}]}, 0x1c}}, 0x4000004) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), r2) sendmsg$NL802154_CMD_GET_WPAN_PHY(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ff26d4d2bbda6bf440acfbbbf9390c4d9ce84889f6f1c2abbdb94d92c66787eb036d1244ef4656c40772e05b6f07beb900539c480d13582b15545df3c6a8c6", @ANYRES16=r3, @ANYBLOB="2f77000000000000000001000000"], 0x14}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), 0xffffffffffffffff) timer_gettime(r0, &(0x7f0000000280)) timer_create(0x3, 0x0, &(0x7f0000000040)=0x0) timer_delete(r0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(r4, 0x1, &(0x7f0000000300)={{0x0, r5+10000000}, {0x77359400}}, &(0x7f0000000380)) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2659.866963] FAULT_INJECTION: forcing a failure. [ 2659.866963] name failslab, interval 1, probability 0, space 0, times 0 [ 2659.868786] CPU: 0 PID: 19084 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 2659.869805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2659.871021] Call Trace: [ 2659.871417] dump_stack+0x107/0x167 [ 2659.871955] should_fail.cold+0x5/0xa [ 2659.872527] ? create_object.isra.0+0x3a/0xa20 [ 2659.873201] should_failslab+0x5/0x20 [ 2659.873770] kmem_cache_alloc+0x5b/0x310 [ 2659.874380] create_object.isra.0+0x3a/0xa20 [ 2659.875042] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2659.875794] kmem_cache_alloc_trace+0x151/0x320 [ 2659.876483] alloc_fs_context+0x57/0x840 [ 2659.877093] path_mount+0xaa3/0x2120 [ 2659.877654] ? strncpy_from_user+0x9e/0x470 [ 2659.878297] ? finish_automount+0xa90/0xa90 [ 2659.878947] ? getname_flags.part.0+0x1dd/0x4f0 [ 2659.879621] ? _copy_from_user+0xfb/0x1b0 [ 2659.880245] __x64_sys_mount+0x282/0x300 [ 2659.880860] ? copy_mnt_ns+0xa00/0xa00 [ 2659.881447] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2659.882210] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2659.882998] do_syscall_64+0x33/0x40 [ 2659.883562] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2659.884311] RIP: 0033:0x7ff76506eb19 [ 2659.884865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2659.887546] RSP: 002b:00007ff7625e4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2659.888653] RAX: ffffffffffffffda RBX: 00007ff765181f60 RCX: 00007ff76506eb19 [ 2659.889705] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2659.890755] RBP: 00007ff7625e41d0 R08: 0000000020000100 R09: 0000000000000000 [ 2659.891809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2659.892862] R13: 00007ffd6a1299cf R14: 00007ff7625e4300 R15: 0000000000022000 17:50:19 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x6e}], 0x1, 0x0) 17:50:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000b80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) [ 2659.946398] FAULT_INJECTION: forcing a failure. [ 2659.946398] name failslab, interval 1, probability 0, space 0, times 0 [ 2659.948114] CPU: 1 PID: 19085 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2659.949001] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2659.950050] Call Trace: [ 2659.950415] dump_stack+0x107/0x167 [ 2659.950892] should_fail.cold+0x5/0xa [ 2659.951376] ? create_object.isra.0+0x3a/0xa20 [ 2659.951956] should_failslab+0x5/0x20 [ 2659.952441] kmem_cache_alloc+0x5b/0x310 [ 2659.952954] ? find_held_lock+0x2c/0x110 [ 2659.953470] create_object.isra.0+0x3a/0xa20 [ 2659.954025] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2659.954672] kmem_cache_alloc+0x159/0x310 [ 2659.955215] __kernfs_iattrs+0xbc/0x470 [ 2659.955731] kernfs_xattr_set+0x2b/0x80 [ 2659.956245] selinux_kernfs_init_security+0x26d/0x4c0 [ 2659.956899] ? selinux_file_mprotect+0x610/0x610 [ 2659.957488] ? find_held_lock+0x2c/0x110 [ 2659.958004] ? __kernfs_new_node+0x2ad/0x860 [ 2659.958570] ? rwlock_bug.part.0+0x90/0x90 [ 2659.959121] security_kernfs_init_security+0x4e/0xb0 [ 2659.959760] __kernfs_new_node+0x531/0x860 [ 2659.960297] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2659.960894] ? cpumask_next+0x1f/0x30 [ 2659.961379] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2659.961968] ? pcpu_alloc+0x12a/0x1240 [ 2659.962467] kernfs_new_node+0x18d/0x250 [ 2659.962991] kernfs_create_dir_ns+0x49/0x160 [ 2659.963561] cgroup_mkdir+0x318/0xf50 [ 2659.964045] ? cgroup_destroy_locked+0x710/0x710 [ 2659.964641] kernfs_iop_mkdir+0x14d/0x1e0 [ 2659.965164] vfs_mkdir+0x493/0x700 [ 2659.965616] do_mkdirat+0x150/0x2b0 [ 2659.966077] ? user_path_create+0xf0/0xf0 [ 2659.966600] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2659.967261] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2659.967899] do_syscall_64+0x33/0x40 [ 2659.968361] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2659.968989] RIP: 0033:0x7f466d9b7b19 [ 2659.969458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2659.971700] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2659.972631] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2659.973505] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2659.974381] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2659.975259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2659.976136] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 17:50:19 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x34, 0x40, 0xff, 0x2, 0x3, 0x3, 0x4, 0x12c, 0x40, 0x126, 0x3, 0xff, 0x38, 0x1, 0x1, 0x2, 0x4}, [{0x2, 0x4, 0x1, 0x3, 0x6, 0x8, 0x100000000, 0x7}, {0x3, 0x8, 0x9, 0xe380, 0x9802, 0xfd18, 0x10001, 0x8}], "f7acdfecde66fdaffa2eddbd18b993d49c3e467f3681e263d525", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6ca) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)}], 0x1) socket$packet(0x11, 0x3, 0x300) 17:50:19 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000740)={0x1c, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_MAC_ACL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x21800020}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r0, 0x2, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x1, 0x1c}}}}, [@NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x10, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4008001}, 0x4044) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x164, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x2002}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x12c0919f}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0xfffffe01}, @NL80211_ATTR_IE={0x135, 0x2a, [@supported_rates={0x1, 0x5, [{0x30}, {0x3}, {0x4}, {0x12}, {0xc, 0x1}]}, @link_id={0x65, 0x12, {@from_mac=@device_b, @device_a, @broadcast}}, @ext_channel_switch={0x3c, 0x4, {0x1, 0x4, 0xad, 0x80}}, @erp={0x2a, 0x1, {0x1, 0x1, 0x1}}, @random_vendor={0xdd, 0xec, "f5ca27c0fbb120e60db90cf71f50d146791fc7ce05dfcc2d5a8fd203866c15a54d6a6ab62a89122560593a6163911d03bafaa6a959c1f75d38e080ace53f1a31ae4c9a7ea0a549ee09b5d875a29290cffe68c8ccaee6f35f8e91d5a1ed2da7f30f80464215590decbb913fd989833920a49883daeddc93d9bbcb999c30585cca2f8dd61abb5f9e9220ba8070084977bbe5f6ec372a971b1998658b515b96e2599bfb4147a0ebfd51191a0c14a171fe65e2fdab3c3d95fe162e265dbc66c864402031485f49c50328bfa039aa5e6bdcb7fe778e368318f5998bd6d94145f64eb7726a26c2acc09ccfd2c60cb4"}, @rann={0x7e, 0x15, {{0x0, 0x49}, 0xe2, 0xaa, @device_a, 0x80000000, 0x6, 0x7fff}}, @mesh_id={0x72, 0x6}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004004) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) readv(r4, &(0x7f0000000300)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 17:50:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2000000d80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef1ff3313d9c0b422fd7ca5e83a4e476460ede3cc2add2e11bd62a1d9dc9682a09", 0x5a, 0x400}], 0x0, &(0x7f0000000040)) 17:50:19 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x2cc3}, &(0x7f0000001000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 32) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) faccessat2(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x2, 0x100) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') 17:50:19 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0xfc}], 0x1, 0x0) 17:50:20 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}, 0x1f4}], 0x1, 0x0) 17:50:20 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000042000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00./file1\x00']) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r2, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x40) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) readv(r0, &(0x7f0000000040), 0x0) [ 2660.227170] FAULT_INJECTION: forcing a failure. [ 2660.227170] name failslab, interval 1, probability 0, space 0, times 0 [ 2660.229102] CPU: 0 PID: 19211 Comm: syz-executor.7 Not tainted 5.10.218 #1 [ 2660.230132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2660.231332] Call Trace: [ 2660.231723] dump_stack+0x107/0x167 [ 2660.232257] should_fail.cold+0x5/0xa [ 2660.232820] ? kvmalloc_node+0x119/0x170 [ 2660.233410] should_failslab+0x5/0x20 [ 2660.233966] __kmalloc_node+0x76/0x420 [ 2660.234539] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2660.235265] kvmalloc_node+0x119/0x170 [ 2660.235846] simple_xattr_alloc+0x43/0xa0 [ 2660.236447] simple_xattr_set+0x75/0x610 [ 2660.237050] kernfs_xattr_set+0x50/0x80 [ 2660.237638] selinux_kernfs_init_security+0x26d/0x4c0 [ 2660.238389] ? selinux_file_mprotect+0x610/0x610 [ 2660.239089] ? find_held_lock+0x2c/0x110 [ 2660.239704] ? __kernfs_new_node+0x2ad/0x860 [ 2660.240352] ? rwlock_bug.part.0+0x90/0x90 [ 2660.240975] security_kernfs_init_security+0x4e/0xb0 [ 2660.241713] __kernfs_new_node+0x531/0x860 [ 2660.242337] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2660.243042] ? cpumask_next+0x1f/0x30 [ 2660.243608] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2660.244294] ? pcpu_alloc+0x12a/0x1240 [ 2660.244872] kernfs_new_node+0x18d/0x250 [ 2660.245471] kernfs_create_dir_ns+0x49/0x160 [ 2660.246119] cgroup_mkdir+0x318/0xf50 [ 2660.246684] ? cgroup_destroy_locked+0x710/0x710 [ 2660.247386] kernfs_iop_mkdir+0x14d/0x1e0 [ 2660.247994] vfs_mkdir+0x493/0x700 [ 2660.248515] do_mkdirat+0x150/0x2b0 [ 2660.249045] ? user_path_create+0xf0/0xf0 [ 2660.249652] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2660.250405] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2660.251159] do_syscall_64+0x33/0x40 [ 2660.251702] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2660.252437] RIP: 0033:0x7f466d9b7b19 [ 2660.252978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2660.255609] RSP: 002b:00007f466af2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2660.256707] RAX: ffffffffffffffda RBX: 00007f466dacaf60 RCX: 00007f466d9b7b19 [ 2660.257736] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 2660.258758] RBP: 00007f466af2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2660.259789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2660.260807] R13: 00007ffc2139554f R14: 00007f466af2d300 R15: 0000000000022000 [ 2673.172447] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888020021000 (size 144): comm "syz-executor.7", pid 19211, jiffies 4297327168 (age 20.555s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 dc c7 54 66 00 00 00 00 ..........Tf.... 0b 80 38 07 00 00 00 00 dc c7 54 66 00 00 00 00 ..8.......Tf.... backtrace: [<00000000e5bb4e25>] __kernfs_iattrs+0xbc/0x470 [<00000000f9a50478>] kernfs_xattr_set+0x2b/0x80 [<0000000058d9559a>] selinux_kernfs_init_security+0x26d/0x4c0 [<0000000038fd7d2f>] security_kernfs_init_security+0x4e/0xb0 [<00000000c2a135f0>] __kernfs_new_node+0x531/0x860 [<00000000e555872d>] kernfs_new_node+0x18d/0x250 [<0000000007dd0379>] kernfs_create_dir_ns+0x49/0x160 [<00000000574bb1b8>] cgroup_mkdir+0x318/0xf50 [<00000000b3b2b5c8>] kernfs_iop_mkdir+0x14d/0x1e0 [<0000000028f7d097>] vfs_mkdir+0x493/0x700 [<000000009daabe2e>] do_mkdirat+0x150/0x2b0 [<00000000f6d054bf>] do_syscall_64+0x33/0x40 [<00000000dd2d24d6>] entry_SYSCALL_64_after_hwframe+0x67/0xd1 BUG: leak checking failed VM DIAGNOSIS: 17:50:41 Registers: info registers vcpu 0 RAX=ffffffff83e6ae20 RBX=0000000000000000 RCX=ffffffff83e52c1c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6b428 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85674108 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e6ae2e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffedbf58050 CR3=0000000004e26000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=0000000000000000000000000000ff00 XMM01=25252525252525252525252525252525 XMM02=646970202c22372e726f747563657865 XMM03=00000000000000000000000000000000 XMM04=0000000000000000000000000000ff00 XMM05=30323038383866666666783020746365 XMM06=34343120657a69732820303030313230 XMM07=652d7a797322206d6d6f6320200a3a29 XMM08=0a316478302f373678302b656d617266 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e6ae20 RBX=0000000000000001 RCX=ffffffff83e52c1c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6b428 RBP=ffffed1001130000 RSP=ffff88800898fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85674108 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e6ae2e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005630b54d7678 CR3=000000000d7e8000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=2934343120657a697328203030303132 XMM03=3120646970202c22372e726f74756365 XMM04=2e2e2e2e2e2e2e202030302030302030 XMM05=20303020303020303020303020303020 XMM06=65747962203233207473726966282070 XMM07=30322065676128203836313732333739 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000