f7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:25:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1876.223568] cgroup: Unknown subsys name 'perf_event' [ 1876.224814] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1876.230423] cgroup: Unknown subsys name 'perf_event' [ 1876.230483] cgroup: Unknown subsys name 'perf_event' [ 1876.232253] cgroup: Unknown subsys name 'perf_event' [ 1876.233710] cgroup: Unknown subsys name 'perf_event' [ 1876.241981] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:25:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) 23:25:34 executing program 6: r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:25:34 executing program 7: r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1876.350845] cgroup: Unknown subsys name 'perf_event' [ 1876.352429] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:25:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:25:34 executing program 0: r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:25:34 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r1]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1876.460697] cgroup: Unknown subsys name 'perf_event' [ 1876.468714] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1876.527010] cgroup: Unknown subsys name 'perf_event' 23:25:35 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r1]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1876.531822] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1876.566781] cgroup: Unknown subsys name 'perf_event' [ 1876.580551] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1876.597365] cgroup: Unknown subsys name 'perf_event' [ 1876.606231] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:25:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) 23:25:35 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:25:48 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:25:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:25:48 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:25:48 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:25:48 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:25:48 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:25:48 executing program 0: chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:25:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) [ 1890.038332] FAT-fs (loop3): bogus number of reserved sectors [ 1890.039133] FAT-fs (loop3): Can't find a valid FAT filesystem 23:25:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x0) 23:25:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x0) 23:25:48 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:25:48 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:25:48 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r1]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1890.467993] FAT-fs (loop5): bogus number of reserved sectors [ 1890.469445] FAT-fs (loop5): Can't find a valid FAT filesystem 23:25:48 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r1]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:25:49 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r1]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:25:49 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r1]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1890.564184] cgroup: Unknown subsys name 'perf_event' [ 1890.565539] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1890.576106] cgroup: Unknown subsys name 'perf_event' 23:25:49 executing program 7: r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1890.586972] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1890.587873] cgroup: Unknown subsys name 'perf_event' [ 1890.589351] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:25:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x0) [ 1890.628096] cgroup: Unknown subsys name 'perf_event' [ 1890.636571] cgroup: Unknown subsys name 'perf_event' [ 1890.641382] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1890.643925] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:25:49 executing program 3: r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:25:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1890.737935] cgroup: Unknown subsys name 'perf_event' [ 1890.739924] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:25:49 executing program 1: chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:02 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:26:02 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:02 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:02 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:02 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:02 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:02 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:26:02 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r1]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1904.449778] cgroup: Unknown subsys name 'perf_event' [ 1904.457810] cgroup: Unknown subsys name 'perf_event' [ 1904.459933] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1904.467632] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1904.476451] cgroup: Unknown subsys name 'perf_event' [ 1904.477547] cgroup: Unknown subsys name 'perf_event' [ 1904.479285] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1904.493834] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:03 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r1]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:03 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:03 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r1]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1904.655471] cgroup: Unknown subsys name 'perf_event' 23:26:03 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 1904.669173] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1904.674538] cgroup: Unknown subsys name 'perf_event' [ 1904.679641] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1904.699957] cgroup: Unknown subsys name 'perf_event' [ 1904.707526] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1904.711113] FAT-fs (loop6): bogus number of reserved sectors [ 1904.711626] FAT-fs (loop6): Can't find a valid FAT filesystem 23:26:16 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:16 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:26:16 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:16 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:16 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1918.274809] cgroup: Unknown subsys name 'perf_event' [ 1918.283579] cgroup: Unknown subsys name 'perf_event' [ 1918.286329] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1918.287230] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:16 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:26:16 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1918.308394] cgroup: Unknown subsys name 'perf_event' [ 1918.321327] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:16 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:26:16 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1918.469525] cgroup: Unknown subsys name 'perf_event' [ 1918.483512] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:17 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:26:17 executing program 6: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1918.579850] cgroup: Unknown subsys name 'perf_event' [ 1918.584856] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:17 executing program 7: chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:17 executing program 0: chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:17 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1918.830008] cgroup: Unknown subsys name 'perf_event' [ 1918.831402] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:17 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:26:17 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:17 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1918.865327] cgroup: Unknown subsys name 'perf_event' 23:26:17 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1918.870227] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:17 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:17 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1918.937674] cgroup: Unknown subsys name 'perf_event' 23:26:17 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1918.966699] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1918.996520] cgroup: Unknown subsys name 'perf_event' [ 1919.018720] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1919.018881] cgroup: Unknown subsys name 'perf_event' [ 1919.031952] cgroup: Unknown subsys name 'perf_event' [ 1919.037353] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1919.041831] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:17 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:17 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1919.265241] cgroup: Unknown subsys name 'perf_event' [ 1919.275271] cgroup: Unknown subsys name 'perf_event' [ 1919.278488] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1919.282872] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:31 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:31 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:31 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:31 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:31 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:31 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1932.637925] cgroup: Unknown subsys name 'perf_event' [ 1932.643198] cgroup: Unknown subsys name 'perf_event' [ 1932.644502] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1932.645247] cgroup: Unknown subsys name 'perf_event' [ 1932.646756] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1932.648837] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1932.685637] cgroup: Unknown subsys name 'perf_event' [ 1932.692697] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1932.711521] cgroup: Unknown subsys name 'perf_event' [ 1932.723960] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1932.771793] cgroup: Unknown subsys name 'perf_event' [ 1932.779611] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:31 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1932.850966] cgroup: Unknown subsys name 'perf_event' [ 1932.858528] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:49 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:49 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:26:49 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:49 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:26:49 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:26:49 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:26:49 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:26:49 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:26:50 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:26:50 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:26:50 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:26:50 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:26:50 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:50 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:50 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:26:50 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1952.155341] cgroup: Unknown subsys name 'perf_event' [ 1952.163303] cgroup: Unknown subsys name 'perf_event' [ 1952.163825] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1952.165266] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:50 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1952.195400] cgroup: Unknown subsys name 'perf_event' [ 1952.197809] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1952.266588] cgroup: Unknown subsys name 'perf_event' [ 1952.275352] cgroup: Unknown subsys name 'perf_event' [ 1952.284989] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:50 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 1952.302282] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:26:50 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:04 executing program 0: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:04 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:27:04 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:27:04 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:27:04 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:27:04 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:04 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1966.034303] cgroup: Unknown subsys name 'perf_event' [ 1966.036949] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1966.046788] cgroup: Unknown subsys name 'perf_event' [ 1966.048198] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:27:04 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:04 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:04 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:04 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:27:18 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:18 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:27:18 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:18 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:27:18 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:27:18 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:18 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:27:18 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 1980.528527] cgroup: Unknown subsys name 'perf_event' [ 1980.531174] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:27:19 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:19 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 1980.760637] cgroup: Unknown subsys name 'perf_event' [ 1980.762740] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:27:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(0xffffffffffffffff, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1980.896556] cgroup: Unknown subsys name 'perf_event' [ 1980.900443] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:27:19 executing program 2: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:19 executing program 5: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:19 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1981.164834] cgroup: Unknown subsys name 'perf_event' [ 1981.167126] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:27:19 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 23:27:19 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:19 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 23:27:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 23:27:19 executing program 0: chdir(&(0x7f0000000040)='./file0\x00') fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:27:19 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:27:19 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1981.511271] cgroup: Unknown subsys name 'perf_event' [ 1981.515317] cgroup: Unknown subsys name 'perf_event' [ 1981.517196] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1981.531290] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:27:20 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 23:27:20 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:20 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 1981.665823] cgroup: Unknown subsys name 'perf_event' [ 1981.672467] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:27:20 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 1981.741456] cgroup: Unknown subsys name 'perf_event' [ 1981.744200] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 1981.761946] cgroup: Unknown subsys name 'perf_event' [ 1981.771416] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:27:35 executing program 6: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:27:35 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:35 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:27:35 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:27:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:35 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:35 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:35 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 1996.967419] cgroup: Unknown subsys name 'perf_event' [ 1996.976507] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:27:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:35 executing program 7: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:27:35 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:27:35 executing program 2: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:27:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:35 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:50 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:50 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:50 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:50 executing program 5: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:27:50 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:27:50 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:50 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:50 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 2011.707796] cgroup: Unknown subsys name 'perf_event' [ 2011.714640] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2011.724156] cgroup: Unknown subsys name 'perf_event' [ 2011.724240] cgroup: Unknown subsys name 'perf_event' [ 2011.731403] cgroup: Unknown subsys name 'perf_event' [ 2011.732864] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2011.745283] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2011.791455] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:27:50 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:27:50 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:27:50 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2011.915162] cgroup: Unknown subsys name 'perf_event' [ 2011.926507] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2011.964280] cgroup: Unknown subsys name 'perf_event' [ 2011.967480] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:03 executing program 6: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:28:03 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:28:03 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:03 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:28:03 executing program 7: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:28:03 executing program 3: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:28:03 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:03 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 2025.481168] cgroup: Unknown subsys name 'perf_event' [ 2025.510648] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2025.515925] cgroup: Unknown subsys name 'perf_event' [ 2025.517148] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:04 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:04 executing program 5: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2025.662580] cgroup: Unknown subsys name 'perf_event' [ 2025.673623] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:04 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2025.823471] cgroup: Unknown subsys name 'perf_event' [ 2025.828893] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:04 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2025.915669] cgroup: Unknown subsys name 'perf_event' [ 2025.916858] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:28:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:28:04 executing program 6: chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:28:04 executing program 0: chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:28:04 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:28:18 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:18 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:18 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:18 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:18 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:18 executing program 7: chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:28:18 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:18 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(0x0, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 2040.278775] cgroup: Unknown subsys name 'perf_event' [ 2040.283433] cgroup: Unknown subsys name 'perf_event' [ 2040.284788] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2040.288583] cgroup: Unknown subsys name 'perf_event' [ 2040.289878] cgroup: Unknown subsys name 'perf_event' [ 2040.292540] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2040.293870] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2040.310732] cgroup: Unknown subsys name 'perf_event' [ 2040.317328] cgroup: Unknown subsys name 'perf_event' [ 2040.318839] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2040.320904] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2040.330554] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:18 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:18 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:28:18 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) fstatfs(r0, 0x0) [ 2040.540244] cgroup: Unknown subsys name 'perf_event' [ 2040.541425] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2040.545812] cgroup: Unknown subsys name 'perf_event' [ 2040.553747] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:32 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:32 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:32 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(0x0, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:28:32 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:28:32 executing program 0: chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:28:32 executing program 6: chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:28:32 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:28:32 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 2054.121226] cgroup: Unknown subsys name 'perf_event' [ 2054.122450] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2054.153300] cgroup: Unknown subsys name 'perf_event' [ 2054.158161] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:32 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:28:48 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:28:48 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:28:48 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:28:48 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:28:48 executing program 1: chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:28:48 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(0x0, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:28:48 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:28:48 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:28:48 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:28:48 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:48 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 2069.965586] cgroup: Unknown subsys name 'perf_event' [ 2069.969158] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:48 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2070.123381] cgroup: Unknown subsys name 'perf_event' [ 2070.126245] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:48 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2070.167464] cgroup: Unknown subsys name 'perf_event' [ 2070.169479] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:48 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2070.290274] cgroup: Unknown subsys name 'perf_event' 23:28:48 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2070.298644] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2070.376455] cgroup: Unknown subsys name 'perf_event' [ 2070.384034] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:28:48 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) 23:28:49 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:28:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) 23:28:49 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:49 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:49 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:49 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:28:49 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2070.596199] cgroup: Unknown subsys name 'perf_event' [ 2070.604939] cgroup: Unknown subsys name 'perf_event' [ 2070.606305] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2070.620619] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2070.629599] cgroup: Unknown subsys name 'perf_event' [ 2070.630636] cgroup: Unknown subsys name 'perf_event' [ 2070.632186] cgroup: Unknown subsys name 'perf_event' [ 2070.633284] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2070.637330] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2070.646476] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:29:02 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:02 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:29:02 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:02 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:02 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) 23:29:02 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:02 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2083.703203] cgroup: Unknown subsys name 'perf_event' [ 2083.757721] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:29:02 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:02 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:02 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:02 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:02 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:29:16 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:29:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:16 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:16 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:16 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:16 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:29:16 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:16 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:16 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2097.911557] cgroup: Unknown subsys name 'perf_event' [ 2097.917144] tmpfs: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿ' 23:29:16 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:29:16 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2097.985389] cgroup: Unknown subsys name 'perf_event' [ 2097.986715] tmpfs: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿ' 23:29:16 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:16 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2098.142052] cgroup: Unknown subsys name 'perf_event' [ 2098.147472] tmpfs: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿ' [ 2098.148736] cgroup: Unknown subsys name 'perf_event' [ 2098.152310] tmpfs: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿ' 23:29:30 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:30 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:30 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:30 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:30 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:30 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:30 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:29:30 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2111.859946] cgroup: Unknown subsys name 'perf_event' [ 2111.863246] cgroup: Unknown subsys name 'perf_event' [ 2111.870355] tmpfs: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿ' [ 2111.884413] cgroup: Unknown subsys name 'perf_event' [ 2111.885553] tmpfs: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿ' [ 2111.894603] tmpfs: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿ' [ 2111.909125] cgroup: Unknown subsys name 'perf_event' [ 2111.913914] cgroup: Unknown subsys name 'perf_event' [ 2111.919038] cgroup: Unknown subsys name 'perf_event' [ 2111.926945] cgroup: Unknown subsys name 'perf_event' [ 2111.931136] tmpfs: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿ' [ 2111.937391] tmpfs: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿ' [ 2111.941881] tmpfs: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿ' [ 2111.955246] tmpfs: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿ' 23:29:30 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:30 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:30 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:30 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 23:29:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:29:44 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:44 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:44 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:44 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:44 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:44 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:44 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:29:44 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2125.691705] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2125.705850] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:29:44 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:44 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:44 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:44 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:44 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 2126.079420] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:29:44 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 2126.104843] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:29:44 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:44 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:44 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:44 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:44 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2126.317862] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:29:44 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:29:44 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:44 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:44 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 2126.417065] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:29:44 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 2126.508098] cgroup: Unknown subsys name 'perf_event' [ 2126.515461] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:29:45 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:29:45 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2126.540695] cgroup: Unknown subsys name 'perf_event' [ 2126.546233] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:29:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:58 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:58 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:29:58 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:29:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:29:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 2140.343399] cgroup: Unknown subsys name 'perf_event' [ 2140.344807] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2140.430118] cgroup: Unknown subsys name 'perf_event' [ 2140.456781] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:30:12 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:12 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:12 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:30:12 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:12 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) 23:30:12 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:12 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:12 executing program 0: r0 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fstatfs(r0, &(0x7f0000000400)=""/196) 23:30:12 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:12 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2154.543645] cgroup: Unknown subsys name 'perf_event' [ 2154.553307] cgroup: Unknown subsys name 'perf_event' 23:30:26 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:30:26 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:26 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:26 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:26 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:26 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) 23:30:26 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:26 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2168.057662] cgroup: Unknown subsys name 'perf_event' [ 2168.138201] cgroup: Unknown subsys name 'perf_event' 23:30:26 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:26 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:26 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) 23:30:26 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:26 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:26 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:26 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:26 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 2168.527243] cgroup: Unknown subsys name 'perf_event' [ 2168.529867] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:30:27 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:27 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:27 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r0, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2168.769335] cgroup: Unknown subsys name 'perf_event' [ 2168.772588] cgroup: Unknown subsys name 'perf_event' [ 2168.773730] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2168.782294] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2168.885681] cgroup: Unknown subsys name 'perf_event' [ 2168.894733] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:30:40 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:40 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:40 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:41 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:41 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:30:41 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:30:41 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:41 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 2182.555211] cgroup: Unknown subsys name 'perf_event' [ 2182.559050] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2182.564426] cgroup: Unknown subsys name 'perf_event' [ 2182.565770] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2182.569174] cgroup: Unknown subsys name 'perf_event' [ 2182.575876] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:30:41 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:41 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) 23:30:41 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000001) 23:30:41 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000001) 23:30:41 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) [ 2182.930227] cgroup: Unknown subsys name 'perf_event' [ 2182.942343] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:30:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:55 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:55 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:30:55 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:55 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:55 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) 23:30:55 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:55 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:55 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:55 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:30:55 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:30:55 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) 23:30:55 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2196.987553] cgroup: Unknown subsys name 'perf_event' [ 2196.991193] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:30:55 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:31:09 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:09 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 23:31:09 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:31:09 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:31:09 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 23:31:09 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 23:31:09 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:31:09 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 23:31:09 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) [ 2211.119832] cgroup: Unknown subsys name 'perf_event' [ 2211.128386] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:31:09 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:09 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:09 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:09 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2211.292287] cgroup: Unknown subsys name 'perf_event' 23:31:09 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2211.297100] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2211.320480] cgroup: Unknown subsys name 'perf_event' [ 2211.325385] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2211.355231] cgroup: Unknown subsys name 'perf_event' [ 2211.359694] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2211.367909] cgroup: Unknown subsys name 'perf_event' [ 2211.369544] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2211.375838] cgroup: Unknown subsys name 'perf_event' [ 2211.400113] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:31:09 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:09 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:23 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:23 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:31:23 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:23 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:23 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:23 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r2]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:23 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:23 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) [ 2224.982421] cgroup: Unknown subsys name 'perf_event' [ 2224.985201] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2224.996347] cgroup: Unknown subsys name 'perf_event' [ 2225.020621] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:31:23 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:23 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:23 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:23 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 23:31:23 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) 23:31:23 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) 23:31:23 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:23 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:23 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2225.422160] cgroup: Unknown subsys name 'perf_event' [ 2225.426774] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2225.465462] cgroup: Unknown subsys name 'perf_event' [ 2225.472519] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2225.504587] cgroup: Unknown subsys name 'perf_event' [ 2225.506542] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:31:24 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:31:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4}, 0x10000, 0x400000, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/netlink\x00') readv(r2, &(0x7f0000001940)=[{&(0x7f0000000240)}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/232, 0xe8}, {0x0}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x6) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c, 0x80000) write$bt_hci(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r2], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') fsmount(r3, 0x0, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000001240)='/proc/self/exe\x00', 0x200, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1, @set_cpb={{0x441, 0xb}, {0x8, 0x0, 0x9, 0x998, 0x80, 0x6, 0x8}}}, 0xf) write$bt_hci(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x4c) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x163000, 0x0) unshare(0x48020200) 23:31:24 executing program 7: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4}, 0x10000, 0x400000, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/netlink\x00') readv(r2, &(0x7f0000001940)=[{&(0x7f0000000240)}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/232, 0xe8}, {0x0}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x6) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c, 0x80000) write$bt_hci(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r2], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="011b04ad6d86f01363b5c505fa590900000000f61f00995366abc98b79576d263ca144ef9aaa1680e3a6d74af07c389b9fd983de2ebf900c3630abf8af9a8b3462a4925041c570e11ead90072e7db51219b9a378f251353aecfecd600a5555167df52d7b369edb22e4f048902b66c95436778b19d45f01edd88d325a265418d92e2dbc1763c12abea3018000000000000006e2afb9125249b4f91fbd2f4a7da3bd06bd230fc21a99d676a4cce006b5de773d96bb71b4bb81b80c522b37a7f4136455a6e934e4919addbdb797ac853e51b64ce6ed303eba09eb7d0f9ca950581c83efc23bfc190afb48ba21429b85e67a2c25d31f7ec75da7a5f33ac7db5c3a3135e3520842f19978be722fe131da142465eebdf208976405eb65804e68d38a40560774368647d0cf1713d2c51bc6ae856fd7883f3ce35c161c83f5aabc"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') fsmount(r3, 0x0, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000001240)='/proc/self/exe\x00', 0x200, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1, @set_cpb={{0x441, 0xb}, {0x8, 0x0, 0x9, 0x998, 0x80, 0x6, 0x8}}}, 0xf) write$bt_hci(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x4c) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x163000, 0x0) unshare(0x48020200) 23:31:24 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4}, 0x10000, 0x400000, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/netlink\x00') readv(r2, &(0x7f0000001940)=[{&(0x7f0000000240)}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/232, 0xe8}, {0x0}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x6) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c, 0x80000) write$bt_hci(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r2], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') fsmount(r3, 0x0, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000001240)='/proc/self/exe\x00', 0x200, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1, @set_cpb={{0x441, 0xb}, {0x8, 0x0, 0x9, 0x998, 0x80, 0x6, 0x8}}}, 0xf) write$bt_hci(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x4c) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x163000, 0x0) unshare(0x48020200) 23:31:24 executing program 6: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4}, 0x10000, 0x400000, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/netlink\x00') readv(r2, &(0x7f0000001940)=[{&(0x7f0000000240)}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/232, 0xe8}, {0x0}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x6) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c, 0x80000) write$bt_hci(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r2], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') fsmount(r3, 0x0, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000001240)='/proc/self/exe\x00', 0x200, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1, @set_cpb={{0x441, 0xb}, {0x8, 0x0, 0x9, 0x998, 0x80, 0x6, 0x8}}}, 0xf) write$bt_hci(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x4c) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x163000, 0x0) unshare(0x48020200) 23:31:24 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4}, 0x10000, 0x400000, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/netlink\x00') readv(r2, &(0x7f0000001940)=[{&(0x7f0000000240)}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/232, 0xe8}, {0x0}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x6) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c, 0x80000) write$bt_hci(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r2], 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') fsmount(r3, 0x0, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000001240)='/proc/self/exe\x00', 0x200, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1, @set_cpb={{0x441, 0xb}, {0x8, 0x0, 0x9, 0x998, 0x80, 0x6, 0x8}}}, 0xf) write$bt_hci(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x4c) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x163000, 0x0) unshare(0x48020200) 23:31:24 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:37 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 1) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:37 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 1) 23:31:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 1) 23:31:37 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:31:37 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:37 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:31:37 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:31:37 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2239.028865] FAULT_INJECTION: forcing a failure. [ 2239.028865] name failslab, interval 1, probability 0, space 0, times 1 [ 2239.030313] CPU: 0 PID: 11901 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2239.030982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2239.031751] Call Trace: [ 2239.032051] dump_stack+0x107/0x167 [ 2239.032430] should_fail.cold+0x5/0xa [ 2239.032773] ? getname_flags.part.0+0x50/0x4f0 [ 2239.033314] should_failslab+0x5/0x20 [ 2239.033685] kmem_cache_alloc+0x5b/0x310 [ 2239.034097] getname_flags.part.0+0x50/0x4f0 [ 2239.034548] getname_flags+0x9a/0xe0 [ 2239.034881] do_mkdirat+0x8f/0x2b0 [ 2239.035286] ? user_path_create+0xf0/0xf0 [ 2239.036318] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2239.036830] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2239.038149] do_syscall_64+0x33/0x40 [ 2239.038550] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2239.039061] RIP: 0033:0x7f0c1cebab19 [ 2239.039474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2239.041242] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2239.042069] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2239.042748] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2239.043467] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2239.044158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2239.044845] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2239.080605] FAULT_INJECTION: forcing a failure. [ 2239.080605] name failslab, interval 1, probability 0, space 0, times 0 [ 2239.082753] CPU: 1 PID: 11895 Comm: syz-executor.5 Not tainted 5.10.224 #1 [ 2239.083375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2239.084094] Call Trace: [ 2239.084351] dump_stack+0x107/0x167 [ 2239.084698] should_fail.cold+0x5/0xa [ 2239.085066] ? alloc_pipe_info+0x10a/0x590 [ 2239.085469] should_failslab+0x5/0x20 [ 2239.085967] kmem_cache_alloc_trace+0x55/0x320 [ 2239.086486] alloc_pipe_info+0x10a/0x590 [ 2239.086873] splice_direct_to_actor+0x774/0x980 [ 2239.087378] ? _cond_resched+0x12/0x80 [ 2239.087723] ? inode_security+0x107/0x140 [ 2239.088074] ? pipe_to_sendpage+0x380/0x380 [ 2239.088443] ? avc_policy_seqno+0x9/0x70 [ 2239.088789] ? selinux_file_permission+0x92/0x520 [ 2239.089196] ? do_splice_to+0x160/0x160 [ 2239.089547] ? security_file_permission+0xb1/0xe0 [ 2239.089971] do_splice_direct+0x1c4/0x290 [ 2239.090330] ? splice_direct_to_actor+0x980/0x980 [ 2239.090737] ? avc_policy_seqno+0x9/0x70 [ 2239.091089] ? security_file_permission+0xb1/0xe0 [ 2239.091507] do_sendfile+0x553/0x11e0 [ 2239.091839] ? do_pwritev+0x270/0x270 [ 2239.092168] ? wait_for_completion_io+0x270/0x270 [ 2239.092582] ? rcu_read_lock_any_held+0x75/0xa0 [ 2239.092976] ? vfs_write+0x354/0xb10 [ 2239.093309] __x64_sys_sendfile64+0x1d1/0x210 [ 2239.093704] ? __ia32_sys_sendfile+0x220/0x220 [ 2239.094099] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2239.094544] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2239.094981] do_syscall_64+0x33/0x40 [ 2239.095300] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2239.095732] RIP: 0033:0x7fb2ec3f9b19 [ 2239.096050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2239.097598] RSP: 002b:00007fb2e996f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2239.098242] RAX: ffffffffffffffda RBX: 00007fb2ec50cf60 RCX: 00007fb2ec3f9b19 [ 2239.098839] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2239.099436] RBP: 00007fb2e996f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2239.100030] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2239.100627] R13: 00007ffdb4f283cf R14: 00007fb2e996f300 R15: 0000000000022000 [ 2239.103541] cgroup: Unknown subsys name 'perf_event' [ 2239.111574] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2239.119099] FAULT_INJECTION: forcing a failure. [ 2239.119099] name failslab, interval 1, probability 0, space 0, times 0 [ 2239.120217] CPU: 0 PID: 11910 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 2239.120831] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2239.121654] Call Trace: [ 2239.121942] dump_stack+0x107/0x167 [ 2239.122300] should_fail.cold+0x5/0xa [ 2239.122642] ? alloc_pipe_info+0x10a/0x590 [ 2239.123074] should_failslab+0x5/0x20 [ 2239.123495] kmem_cache_alloc_trace+0x55/0x320 [ 2239.123928] alloc_pipe_info+0x10a/0x590 [ 2239.124333] splice_direct_to_actor+0x774/0x980 [ 2239.124733] ? _cond_resched+0x12/0x80 [ 2239.125110] ? inode_security+0x107/0x140 [ 2239.125514] ? pipe_to_sendpage+0x380/0x380 [ 2239.125955] ? avc_policy_seqno+0x9/0x70 [ 2239.126345] ? selinux_file_permission+0x92/0x520 [ 2239.126750] ? do_splice_to+0x160/0x160 [ 2239.127164] ? security_file_permission+0xb1/0xe0 [ 2239.127651] do_splice_direct+0x1c4/0x290 [ 2239.128054] ? splice_direct_to_actor+0x980/0x980 [ 2239.128503] ? avc_policy_seqno+0x9/0x70 [ 2239.128856] ? security_file_permission+0xb1/0xe0 [ 2239.129370] do_sendfile+0x553/0x11e0 [ 2239.129717] ? do_pwritev+0x270/0x270 [ 2239.130087] ? wait_for_completion_io+0x270/0x270 [ 2239.130548] ? rcu_read_lock_any_held+0x75/0xa0 [ 2239.131011] ? vfs_write+0x354/0xb10 [ 2239.131411] __x64_sys_sendfile64+0x1d1/0x210 [ 2239.131791] ? __ia32_sys_sendfile+0x220/0x220 [ 2239.132237] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2239.132726] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2239.133211] do_syscall_64+0x33/0x40 [ 2239.133591] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2239.134071] RIP: 0033:0x7f899d3cbb19 [ 2239.134432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2239.136151] RSP: 002b:00007f899a920188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2239.136838] RAX: ffffffffffffffda RBX: 00007f899d4df020 RCX: 00007f899d3cbb19 [ 2239.137540] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000006 [ 2239.138191] RBP: 00007f899a9201d0 R08: 0000000000000000 R09: 0000000000000000 [ 2239.138835] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2239.139571] R13: 00007ffc2a56e11f R14: 00007f899a920300 R15: 0000000000022000 23:31:51 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 2) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:51 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 1) 23:31:51 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 1) 23:31:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 1) 23:31:51 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 1) 23:31:51 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:31:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 2) 23:31:51 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 2) [ 2252.593316] FAULT_INJECTION: forcing a failure. [ 2252.593316] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.594453] CPU: 1 PID: 11933 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2252.602026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2252.602712] Call Trace: [ 2252.602942] dump_stack+0x107/0x167 [ 2252.603249] should_fail.cold+0x5/0xa [ 2252.603574] ? create_object.isra.0+0x3a/0xa20 [ 2252.603963] should_failslab+0x5/0x20 [ 2252.604287] kmem_cache_alloc+0x5b/0x310 [ 2252.604630] ? ksys_write+0x21a/0x260 [ 2252.604953] create_object.isra.0+0x3a/0xa20 [ 2252.605324] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2252.605789] kmem_cache_alloc+0x159/0x310 [ 2252.606147] getname_flags.part.0+0x50/0x4f0 [ 2252.606518] getname_flags+0x9a/0xe0 [ 2252.606833] do_mkdirat+0x8f/0x2b0 [ 2252.607134] ? user_path_create+0xf0/0xf0 [ 2252.607489] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2252.607930] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2252.608363] do_syscall_64+0x33/0x40 [ 2252.608677] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2252.609107] RIP: 0033:0x7f0c1cebab19 [ 2252.609422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2252.615035] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2252.615976] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2252.616568] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2252.617162] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2252.617784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2252.618426] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2252.645534] FAULT_INJECTION: forcing a failure. [ 2252.645534] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.646824] CPU: 1 PID: 11917 Comm: syz-executor.2 Not tainted 5.10.224 #1 [ 2252.647415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2252.648152] Call Trace: [ 2252.648386] dump_stack+0x107/0x167 [ 2252.648687] FAULT_INJECTION: forcing a failure. [ 2252.648687] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.649664] should_fail.cold+0x5/0xa [ 2252.649683] ? alloc_pipe_info+0x10a/0x590 [ 2252.649748] should_failslab+0x5/0x20 [ 2252.649774] kmem_cache_alloc_trace+0x55/0x320 [ 2252.651254] alloc_pipe_info+0x10a/0x590 [ 2252.651600] splice_direct_to_actor+0x774/0x980 [ 2252.652043] ? _cond_resched+0x12/0x80 [ 2252.652374] ? inode_security+0x107/0x140 [ 2252.652792] ? pipe_to_sendpage+0x380/0x380 [ 2252.653160] ? avc_policy_seqno+0x9/0x70 [ 2252.653500] ? selinux_file_permission+0x92/0x520 [ 2252.653965] ? do_splice_to+0x160/0x160 [ 2252.654309] ? security_file_permission+0xb1/0xe0 [ 2252.654758] do_splice_direct+0x1c4/0x290 [ 2252.655116] ? splice_direct_to_actor+0x980/0x980 [ 2252.655517] ? avc_policy_seqno+0x9/0x70 [ 2252.655910] ? security_file_permission+0xb1/0xe0 [ 2252.656329] do_sendfile+0x553/0x11e0 [ 2252.656657] ? do_pwritev+0x270/0x270 [ 2252.657056] ? wait_for_completion_io+0x270/0x270 [ 2252.657467] ? rcu_read_lock_any_held+0x75/0xa0 [ 2252.657914] ? vfs_write+0x354/0xb10 [ 2252.658238] __x64_sys_sendfile64+0x1d1/0x210 [ 2252.658615] ? __ia32_sys_sendfile+0x220/0x220 [ 2252.659053] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2252.659500] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2252.659982] do_syscall_64+0x33/0x40 [ 2252.660296] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2252.660794] RIP: 0033:0x7ff7be6abb19 [ 2252.661114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2252.662741] RSP: 002b:00007ff7bbc21188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2252.663386] RAX: ffffffffffffffda RBX: 00007ff7be7bef60 RCX: 00007ff7be6abb19 [ 2252.664024] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2252.664615] RBP: 00007ff7bbc211d0 R08: 0000000000000000 R09: 0000000000000000 [ 2252.665278] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2252.665928] R13: 00007fff3e2a8ebf R14: 00007ff7bbc21300 R15: 0000000000022000 [ 2252.666546] CPU: 0 PID: 11927 Comm: syz-executor.7 Not tainted 5.10.224 #1 [ 2252.667201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2252.667940] Call Trace: [ 2252.668175] dump_stack+0x107/0x167 [ 2252.668493] should_fail.cold+0x5/0xa [ 2252.668818] ? alloc_pipe_info+0x10a/0x590 [ 2252.668862] FAULT_INJECTION: forcing a failure. [ 2252.668862] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.669252] should_failslab+0x5/0x20 [ 2252.669276] kmem_cache_alloc_trace+0x55/0x320 [ 2252.675442] alloc_pipe_info+0x10a/0x590 [ 2252.675787] splice_direct_to_actor+0x774/0x980 [ 2252.676230] ? _cond_resched+0x12/0x80 [ 2252.676559] ? inode_security+0x107/0x140 [ 2252.676963] ? pipe_to_sendpage+0x380/0x380 [ 2252.677326] ? avc_policy_seqno+0x9/0x70 [ 2252.677665] ? selinux_file_permission+0x92/0x520 [ 2252.678165] ? do_splice_to+0x160/0x160 [ 2252.678503] ? security_file_permission+0xb1/0xe0 [ 2252.678972] do_splice_direct+0x1c4/0x290 [ 2252.679321] ? splice_direct_to_actor+0x980/0x980 [ 2252.679721] ? avc_policy_seqno+0x9/0x70 [ 2252.680117] ? security_file_permission+0xb1/0xe0 [ 2252.680528] do_sendfile+0x553/0x11e0 [ 2252.680854] ? do_pwritev+0x270/0x270 [ 2252.681234] ? wait_for_completion_io+0x270/0x270 [ 2252.681641] ? rcu_read_lock_any_held+0x75/0xa0 [ 2252.682119] ? vfs_write+0x354/0xb10 [ 2252.682438] __x64_sys_sendfile64+0x1d1/0x210 [ 2252.682814] ? __ia32_sys_sendfile+0x220/0x220 [ 2252.683261] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2252.683698] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2252.684180] do_syscall_64+0x33/0x40 [ 2252.684493] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2252.684977] RIP: 0033:0x7f0361883b19 [ 2252.685289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2252.686931] RSP: 002b:00007f035edf9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2252.687571] RAX: ffffffffffffffda RBX: 00007f0361996f60 RCX: 00007f0361883b19 [ 2252.688207] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2252.688796] RBP: 00007f035edf91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2252.689439] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2252.690115] R13: 00007fffbfc0e05f R14: 00007f035edf9300 R15: 0000000000022000 [ 2252.690726] CPU: 1 PID: 11930 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 2252.691390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2252.692078] Call Trace: [ 2252.692309] dump_stack+0x107/0x167 [ 2252.692618] should_fail.cold+0x5/0xa [ 2252.692943] ? create_object.isra.0+0x3a/0xa20 [ 2252.693333] should_failslab+0x5/0x20 [ 2252.693660] kmem_cache_alloc+0x5b/0x310 [ 2252.694163] create_object.isra.0+0x3a/0xa20 [ 2252.694535] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2252.695190] kmem_cache_alloc_trace+0x151/0x320 [ 2252.695593] alloc_pipe_info+0x10a/0x590 [ 2252.695949] splice_direct_to_actor+0x774/0x980 [ 2252.696346] ? _cond_resched+0x12/0x80 [ 2252.696688] ? inode_security+0x107/0x140 [ 2252.697038] ? pipe_to_sendpage+0x380/0x380 [ 2252.697404] ? avc_policy_seqno+0x9/0x70 [ 2252.697858] ? selinux_file_permission+0x92/0x520 [ 2252.698268] ? do_splice_to+0x160/0x160 [ 2252.698611] ? security_file_permission+0xb1/0xe0 [ 2252.698833] FAULT_INJECTION: forcing a failure. [ 2252.698833] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.699024] do_splice_direct+0x1c4/0x290 [ 2252.699037] ? splice_direct_to_actor+0x980/0x980 [ 2252.699046] ? avc_policy_seqno+0x9/0x70 [ 2252.699063] ? security_file_permission+0xb1/0xe0 [ 2252.699081] do_sendfile+0x553/0x11e0 [ 2252.699099] ? do_pwritev+0x270/0x270 [ 2252.699118] ? wait_for_completion_io+0x270/0x270 [ 2252.702547] ? rcu_read_lock_any_held+0x75/0xa0 [ 2252.702934] ? vfs_write+0x354/0xb10 [ 2252.703255] __x64_sys_sendfile64+0x1d1/0x210 [ 2252.703632] ? __ia32_sys_sendfile+0x220/0x220 [ 2252.704022] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2252.704460] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2252.704892] do_syscall_64+0x33/0x40 [ 2252.705208] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2252.705641] RIP: 0033:0x7f899d3cbb19 [ 2252.705976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2252.707497] RSP: 002b:00007f899a941188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2252.708134] RAX: ffffffffffffffda RBX: 00007f899d4def60 RCX: 00007f899d3cbb19 [ 2252.708725] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2252.709321] RBP: 00007f899a9411d0 R08: 0000000000000000 R09: 0000000000000000 [ 2252.710638] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2252.711276] R13: 00007ffc2a56e11f R14: 00007f899a941300 R15: 0000000000022000 [ 2252.711958] CPU: 0 PID: 11944 Comm: syz-executor.5 Not tainted 5.10.224 #1 [ 2252.712530] cgroup: Unknown subsys name 'perf_event' [ 2252.712551] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2252.712561] Call Trace: [ 2252.714037] dump_stack+0x107/0x167 [ 2252.714351] should_fail.cold+0x5/0xa [ 2252.714683] ? create_object.isra.0+0x3a/0xa20 [ 2252.715132] should_failslab+0x5/0x20 [ 2252.715454] kmem_cache_alloc+0x5b/0x310 [ 2252.715801] create_object.isra.0+0x3a/0xa20 [ 2252.716232] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2252.716678] kmem_cache_alloc_trace+0x151/0x320 [ 2252.717137] alloc_pipe_info+0x10a/0x590 [ 2252.717497] splice_direct_to_actor+0x774/0x980 [ 2252.717984] ? _cond_resched+0x12/0x80 [ 2252.718315] ? inode_security+0x107/0x140 [ 2252.718673] ? pipe_to_sendpage+0x380/0x380 [ 2252.719108] ? avc_policy_seqno+0x9/0x70 [ 2252.719461] ? selinux_file_permission+0x92/0x520 [ 2252.719867] ? do_splice_to+0x160/0x160 [ 2252.720263] ? security_file_permission+0xb1/0xe0 [ 2252.720686] do_splice_direct+0x1c4/0x290 [ 2252.721099] ? splice_direct_to_actor+0x980/0x980 [ 2252.721518] ? avc_policy_seqno+0x9/0x70 [ 2252.721960] ? security_file_permission+0xb1/0xe0 [ 2252.722390] do_sendfile+0x553/0x11e0 [ 2252.722729] ? do_pwritev+0x270/0x270 [ 2252.723122] ? wait_for_completion_io+0x270/0x270 [ 2252.723541] ? rcu_read_lock_any_held+0x75/0xa0 [ 2252.723988] ? vfs_write+0x354/0xb10 [ 2252.724321] __x64_sys_sendfile64+0x1d1/0x210 [ 2252.724708] ? __ia32_sys_sendfile+0x220/0x220 [ 2252.725159] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2252.725614] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2252.726143] do_syscall_64+0x33/0x40 [ 2252.726468] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2252.726965] RIP: 0033:0x7fb2ec3f9b19 [ 2252.727286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2252.728922] RSP: 002b:00007fb2e994e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2252.729581] RAX: ffffffffffffffda RBX: 00007fb2ec50d020 RCX: 00007fb2ec3f9b19 [ 2252.730271] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2252.730925] RBP: 00007fb2e994e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2252.731536] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2252.732190] R13: 00007ffdb4f283cf R14: 00007fb2e994e300 R15: 0000000000022000 [ 2252.737148] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2252.749551] FAULT_INJECTION: forcing a failure. [ 2252.749551] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.750775] CPU: 0 PID: 11931 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 2252.751408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2252.752138] Call Trace: [ 2252.752362] dump_stack+0x107/0x167 [ 2252.752668] should_fail.cold+0x5/0xa [ 2252.753048] ? alloc_pipe_info+0x10a/0x590 [ 2252.753403] should_failslab+0x5/0x20 [ 2252.753731] kmem_cache_alloc_trace+0x55/0x320 [ 2252.754197] alloc_pipe_info+0x10a/0x590 [ 2252.754541] splice_direct_to_actor+0x774/0x980 [ 2252.754987] ? _cond_resched+0x12/0x80 [ 2252.755312] ? inode_security+0x107/0x140 [ 2252.755659] ? pipe_to_sendpage+0x380/0x380 [ 2252.756069] ? avc_policy_seqno+0x9/0x70 [ 2252.756411] ? selinux_file_permission+0x92/0x520 [ 2252.756814] ? do_splice_to+0x160/0x160 [ 2252.757209] ? security_file_permission+0xb1/0xe0 [ 2252.757618] do_splice_direct+0x1c4/0x290 [ 2252.758057] ? splice_direct_to_actor+0x980/0x980 [ 2252.758462] ? avc_policy_seqno+0x9/0x70 [ 2252.758810] ? security_file_permission+0xb1/0xe0 [ 2252.759278] do_sendfile+0x553/0x11e0 [ 2252.759611] ? do_pwritev+0x270/0x270 [ 2252.759987] ? wait_for_completion_io+0x270/0x270 [ 2252.760396] ? rcu_read_lock_any_held+0x75/0xa0 [ 2252.760790] ? vfs_write+0x354/0xb10 [ 2252.761168] __x64_sys_sendfile64+0x1d1/0x210 [ 2252.761551] ? __ia32_sys_sendfile+0x220/0x220 [ 2252.762028] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2252.762470] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2252.762965] do_syscall_64+0x33/0x40 [ 2252.763282] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2252.763712] RIP: 0033:0x7fda184cab19 [ 2252.764072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2252.765651] RSP: 002b:00007fda15a40188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2252.766379] RAX: ffffffffffffffda RBX: 00007fda185ddf60 RCX: 00007fda184cab19 [ 2252.767080] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2252.767675] RBP: 00007fda15a401d0 R08: 0000000000000000 R09: 0000000000000000 [ 2252.768319] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2252.768973] R13: 00007ffc0f97e54f R14: 00007fda15a40300 R15: 0000000000022000 [ 2252.772115] FAULT_INJECTION: forcing a failure. [ 2252.772115] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.773168] CPU: 0 PID: 11921 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2252.773802] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2252.774558] Call Trace: [ 2252.776961] dump_stack+0x107/0x167 [ 2252.777273] should_fail.cold+0x5/0xa [ 2252.777596] ? alloc_pipe_info+0x10a/0x590 [ 2252.778045] should_failslab+0x5/0x20 [ 2252.778368] kmem_cache_alloc_trace+0x55/0x320 [ 2252.778755] alloc_pipe_info+0x10a/0x590 [ 2252.779155] splice_direct_to_actor+0x774/0x980 [ 2252.779550] ? _cond_resched+0x12/0x80 [ 2252.779915] ? inode_security+0x107/0x140 [ 2252.780272] ? pipe_to_sendpage+0x380/0x380 [ 2252.780633] ? avc_policy_seqno+0x9/0x70 [ 2252.781031] ? selinux_file_permission+0x92/0x520 [ 2252.781435] ? do_splice_to+0x160/0x160 [ 2252.781791] ? security_file_permission+0xb1/0xe0 [ 2252.782275] do_splice_direct+0x1c4/0x290 [ 2252.782627] ? splice_direct_to_actor+0x980/0x980 [ 2252.783091] ? avc_policy_seqno+0x9/0x70 [ 2252.783445] ? security_file_permission+0xb1/0xe0 [ 2252.783870] do_sendfile+0x553/0x11e0 [ 2252.784247] ? do_pwritev+0x270/0x270 [ 2252.784573] ? wait_for_completion_io+0x270/0x270 [ 2252.785042] ? rcu_read_lock_any_held+0x75/0xa0 [ 2252.785434] ? vfs_write+0x354/0xb10 [ 2252.785765] __x64_sys_sendfile64+0x1d1/0x210 [ 2252.786224] ? __ia32_sys_sendfile+0x220/0x220 [ 2252.786624] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2252.787124] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2252.787563] do_syscall_64+0x33/0x40 [ 2252.787919] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2252.788363] RIP: 0033:0x7f9efa275b19 [ 2252.788679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2252.790350] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2252.791052] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2252.791649] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2252.792291] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2252.792938] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2252.793543] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 23:31:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 3) 23:31:51 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 2) 23:31:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 2) [ 2252.911282] FAULT_INJECTION: forcing a failure. [ 2252.911282] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.912318] CPU: 0 PID: 11947 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 2252.912900] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2252.913619] Call Trace: [ 2252.913893] dump_stack+0x107/0x167 [ 2252.914223] should_fail.cold+0x5/0xa [ 2252.914568] ? alloc_pipe_info+0x1e5/0x590 [ 2252.914968] should_failslab+0x5/0x20 [ 2252.915355] __kmalloc+0x72/0x390 23:31:51 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 3) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:51 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 2) [ 2252.915715] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2252.916494] alloc_pipe_info+0x1e5/0x590 [ 2252.916941] splice_direct_to_actor+0x774/0x980 [ 2252.917460] ? _cond_resched+0x12/0x80 [ 2252.917875] ? inode_security+0x107/0x140 [ 2252.918242] ? pipe_to_sendpage+0x380/0x380 [ 2252.918621] ? avc_policy_seqno+0x9/0x70 [ 2252.918972] ? selinux_file_permission+0x92/0x520 [ 2252.919377] ? do_splice_to+0x160/0x160 [ 2252.919722] ? security_file_permission+0xb1/0xe0 [ 2252.920134] do_splice_direct+0x1c4/0x290 [ 2252.920485] ? splice_direct_to_actor+0x980/0x980 [ 2252.920888] ? avc_policy_seqno+0x9/0x70 [ 2252.921239] ? security_file_permission+0xb1/0xe0 [ 2252.921658] do_sendfile+0x553/0x11e0 [ 2252.922007] ? do_pwritev+0x270/0x270 [ 2252.922335] ? wait_for_completion_io+0x270/0x270 [ 2252.922749] ? rcu_read_lock_any_held+0x75/0xa0 [ 2252.923200] ? vfs_write+0x354/0xb10 [ 2252.923569] __x64_sys_sendfile64+0x1d1/0x210 [ 2252.923999] ? __ia32_sys_sendfile+0x220/0x220 [ 2252.924440] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2252.924938] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2252.925427] do_syscall_64+0x33/0x40 [ 2252.925785] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2252.926277] RIP: 0033:0x7f899d3cbb19 [ 2252.926627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2252.928353] RSP: 002b:00007f899a941188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2252.929165] RAX: ffffffffffffffda RBX: 00007f899d4def60 RCX: 00007f899d3cbb19 [ 2252.929849] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2252.930533] RBP: 00007f899a9411d0 R08: 0000000000000000 R09: 0000000000000000 [ 2252.931207] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2252.931880] R13: 00007ffc2a56e11f R14: 00007f899a941300 R15: 0000000000022000 [ 2252.937690] FAULT_INJECTION: forcing a failure. [ 2252.937690] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.938836] CPU: 1 PID: 11950 Comm: syz-executor.2 Not tainted 5.10.224 #1 [ 2252.939490] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2252.940258] Call Trace: [ 2252.940514] dump_stack+0x107/0x167 [ 2252.940854] should_fail.cold+0x5/0xa [ 2252.941231] ? create_object.isra.0+0x3a/0xa20 [ 2252.941683] should_failslab+0x5/0x20 [ 2252.942059] kmem_cache_alloc+0x5b/0x310 [ 2252.942444] create_object.isra.0+0x3a/0xa20 [ 2252.942861] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2252.943351] kmem_cache_alloc_trace+0x151/0x320 [ 2252.943795] alloc_pipe_info+0x10a/0x590 [ 2252.944188] splice_direct_to_actor+0x774/0x980 [ 2252.944634] ? _cond_resched+0x12/0x80 [ 2252.945009] ? inode_security+0x107/0x140 [ 2252.945395] ? pipe_to_sendpage+0x380/0x380 [ 2252.945810] ? avc_policy_seqno+0x9/0x70 [ 2252.946197] ? selinux_file_permission+0x92/0x520 [ 2252.946651] ? do_splice_to+0x160/0x160 [ 2252.947034] ? security_file_permission+0xb1/0xe0 [ 2252.947495] do_splice_direct+0x1c4/0x290 [ 2252.947881] ? splice_direct_to_actor+0x980/0x980 [ 2252.948339] ? avc_policy_seqno+0x9/0x70 [ 2252.948730] ? security_file_permission+0xb1/0xe0 [ 2252.949194] do_sendfile+0x553/0x11e0 [ 2252.949562] ? do_pwritev+0x270/0x270 [ 2252.949931] ? wait_for_completion_io+0x270/0x270 [ 2252.950395] ? rcu_read_lock_any_held+0x75/0xa0 [ 2252.950825] ? vfs_write+0x354/0xb10 [ 2252.951186] __x64_sys_sendfile64+0x1d1/0x210 [ 2252.951608] ? __ia32_sys_sendfile+0x220/0x220 [ 2252.952044] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2252.952538] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2252.953025] do_syscall_64+0x33/0x40 [ 2252.953375] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2252.953858] RIP: 0033:0x7ff7be6abb19 [ 2252.954219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2252.955929] RSP: 002b:00007ff7bbc21188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2252.956645] RAX: ffffffffffffffda RBX: 00007ff7be7bef60 RCX: 00007ff7be6abb19 [ 2252.957306] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2252.957982] RBP: 00007ff7bbc211d0 R08: 0000000000000000 R09: 0000000000000000 [ 2252.958671] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2252.959335] R13: 00007fff3e2a8ebf R14: 00007ff7bbc21300 R15: 0000000000022000 [ 2252.980859] FAULT_INJECTION: forcing a failure. [ 2252.980859] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.982076] CPU: 1 PID: 11953 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2252.982719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2252.983495] Call Trace: [ 2252.983751] dump_stack+0x107/0x167 [ 2252.984107] should_fail.cold+0x5/0xa [ 2252.984472] ? create_object.isra.0+0x3a/0xa20 [ 2252.984905] should_failslab+0x5/0x20 [ 2252.985268] kmem_cache_alloc+0x5b/0x310 [ 2252.985653] create_object.isra.0+0x3a/0xa20 [ 2252.986075] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2252.986559] kmem_cache_alloc_trace+0x151/0x320 [ 2252.986994] alloc_pipe_info+0x10a/0x590 [ 2252.987388] splice_direct_to_actor+0x774/0x980 [ 2252.987832] ? _cond_resched+0x12/0x80 [ 2252.988206] ? inode_security+0x107/0x140 [ 2252.988598] ? pipe_to_sendpage+0x380/0x380 [ 2252.989014] ? avc_policy_seqno+0x9/0x70 [ 2252.989405] ? selinux_file_permission+0x92/0x520 [ 2252.989882] ? do_splice_to+0x160/0x160 [ 2252.990269] ? security_file_permission+0xb1/0xe0 [ 2252.990736] do_splice_direct+0x1c4/0x290 [ 2252.991138] ? splice_direct_to_actor+0x980/0x980 [ 2252.991616] ? avc_policy_seqno+0x9/0x70 [ 2252.992010] ? security_file_permission+0xb1/0xe0 [ 2252.992482] do_sendfile+0x553/0x11e0 [ 2252.992847] ? do_pwritev+0x270/0x270 [ 2252.993211] ? wait_for_completion_io+0x270/0x270 [ 2252.993678] ? rcu_read_lock_any_held+0x75/0xa0 [ 2252.994121] ? vfs_write+0x354/0xb10 [ 2252.994483] __x64_sys_sendfile64+0x1d1/0x210 [ 2252.994919] ? __ia32_sys_sendfile+0x220/0x220 [ 2252.995380] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2252.995885] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2252.996386] do_syscall_64+0x33/0x40 [ 2252.996749] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2252.997238] RIP: 0033:0x7f9efa275b19 [ 2252.997598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2252.999344] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2253.000058] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2253.000727] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2253.001397] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2253.002074] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2253.002739] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 23:31:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 4) [ 2253.024101] FAULT_INJECTION: forcing a failure. [ 2253.024101] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 2253.025534] CPU: 1 PID: 11955 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2253.026194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2253.027048] Call Trace: [ 2253.027328] dump_stack+0x107/0x167 [ 2253.027672] should_fail.cold+0x5/0xa [ 2253.028036] strncpy_from_user+0x34/0x470 [ 2253.028431] getname_flags.part.0+0x95/0x4f0 [ 2253.028842] getname_flags+0x9a/0xe0 [ 2253.029193] do_mkdirat+0x8f/0x2b0 [ 2253.029529] ? user_path_create+0xf0/0xf0 23:31:51 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 2) [ 2253.029935] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2253.030593] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2253.031080] do_syscall_64+0x33/0x40 [ 2253.031437] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2253.031917] RIP: 0033:0x7f0c1cebab19 [ 2253.032272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2253.034055] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2253.034767] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2253.035431] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2253.036105] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2253.036773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2253.037439] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2253.044504] cgroup: Unknown subsys name 'perf_event' [ 2253.054708] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2253.081806] FAULT_INJECTION: forcing a failure. [ 2253.081806] name failslab, interval 1, probability 0, space 0, times 0 [ 2253.083011] CPU: 0 PID: 11956 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 2253.083667] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2253.084360] Call Trace: [ 2253.084593] dump_stack+0x107/0x167 [ 2253.084906] should_fail.cold+0x5/0xa [ 2253.085258] ? create_object.isra.0+0x3a/0xa20 [ 2253.085726] should_failslab+0x5/0x20 [ 2253.086092] kmem_cache_alloc+0x5b/0x310 [ 2253.086489] create_object.isra.0+0x3a/0xa20 [ 2253.086904] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2253.087388] kmem_cache_alloc_trace+0x151/0x320 [ 2253.087837] alloc_pipe_info+0x10a/0x590 [ 2253.088220] splice_direct_to_actor+0x774/0x980 [ 2253.088670] ? _cond_resched+0x12/0x80 [ 2253.089036] ? inode_security+0x107/0x140 [ 2253.089425] ? pipe_to_sendpage+0x380/0x380 [ 2253.089838] ? avc_policy_seqno+0x9/0x70 [ 2253.090217] ? selinux_file_permission+0x92/0x520 [ 2253.090671] ? do_splice_to+0x160/0x160 [ 2253.091056] ? security_file_permission+0xb1/0xe0 [ 2253.091522] do_splice_direct+0x1c4/0x290 [ 2253.091909] ? splice_direct_to_actor+0x980/0x980 [ 2253.092336] ? avc_policy_seqno+0x9/0x70 [ 2253.092733] ? security_file_permission+0xb1/0xe0 [ 2253.093204] do_sendfile+0x553/0x11e0 [ 2253.093574] ? do_pwritev+0x270/0x270 [ 2253.093947] ? wait_for_completion_io+0x270/0x270 [ 2253.094413] ? rcu_read_lock_any_held+0x75/0xa0 [ 2253.094853] ? vfs_write+0x354/0xb10 [ 2253.095220] __x64_sys_sendfile64+0x1d1/0x210 [ 2253.095648] ? __ia32_sys_sendfile+0x220/0x220 [ 2253.096094] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2253.096596] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2253.097084] do_syscall_64+0x33/0x40 [ 2253.097446] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2253.097941] RIP: 0033:0x7fda184cab19 [ 2253.098309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2253.100058] RSP: 002b:00007fda15a40188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2253.100777] RAX: ffffffffffffffda RBX: 00007fda185ddf60 RCX: 00007fda184cab19 [ 2253.101451] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2253.102141] RBP: 00007fda15a401d0 R08: 0000000000000000 R09: 0000000000000000 [ 2253.102372] FAULT_INJECTION: forcing a failure. [ 2253.102372] name failslab, interval 1, probability 0, space 0, times 0 [ 2253.102815] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2253.102823] R13: 00007ffc0f97e54f R14: 00007fda15a40300 R15: 0000000000022000 [ 2253.105468] CPU: 1 PID: 11959 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 2253.106118] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2253.106878] Call Trace: [ 2253.107153] dump_stack+0x107/0x167 [ 2253.107535] should_fail.cold+0x5/0xa [ 2253.107921] ? create_object.isra.0+0x3a/0xa20 [ 2253.108404] should_failslab+0x5/0x20 [ 2253.108790] kmem_cache_alloc+0x5b/0x310 [ 2253.109197] ? create_object.isra.0+0x3ad/0xa20 [ 2253.109679] create_object.isra.0+0x3a/0xa20 [ 2253.110243] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2253.110764] __kmalloc_node+0x1ae/0x420 [ 2253.111164] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2253.111692] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 2253.112199] ? trace_hardirqs_on+0x5b/0x180 [ 2253.112653] kmem_cache_alloc_trace+0x169/0x320 [ 2253.113125] alloc_pipe_info+0x10a/0x590 [ 2253.113551] splice_direct_to_actor+0x774/0x980 [ 2253.113995] ? _cond_resched+0x12/0x80 [ 2253.114328] ? inode_security+0x107/0x140 [ 2253.114676] ? pipe_to_sendpage+0x380/0x380 [ 2253.115044] ? avc_policy_seqno+0x9/0x70 [ 2253.115394] ? selinux_file_permission+0x92/0x520 [ 2253.115801] ? do_splice_to+0x160/0x160 [ 2253.116146] ? security_file_permission+0xb1/0xe0 [ 2253.116558] do_splice_direct+0x1c4/0x290 [ 2253.116909] ? splice_direct_to_actor+0x980/0x980 [ 2253.117316] ? avc_policy_seqno+0x9/0x70 23:31:51 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 2253.117669] ? security_file_permission+0xb1/0xe0 [ 2253.118098] do_sendfile+0x553/0x11e0 [ 2253.118430] ? do_pwritev+0x270/0x270 [ 2253.118756] ? wait_for_completion_io+0x270/0x270 [ 2253.119173] ? rcu_read_lock_any_held+0x75/0xa0 [ 2253.119759] ? vfs_write+0x354/0xb10 [ 2253.120087] __x64_sys_sendfile64+0x1d1/0x210 [ 2253.120468] ? __ia32_sys_sendfile+0x220/0x220 [ 2253.120861] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2253.121304] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2253.121750] do_syscall_64+0x33/0x40 [ 2253.122094] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2253.122577] RIP: 0033:0x7f899d3cbb19 [ 2253.122928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2253.124682] RSP: 002b:00007f899a941188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2253.125406] RAX: ffffffffffffffda RBX: 00007f899d4def60 RCX: 00007f899d3cbb19 [ 2253.126083] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2253.126760] RBP: 00007f899a9411d0 R08: 0000000000000000 R09: 0000000000000000 [ 2253.127427] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2253.128093] R13: 00007ffc2a56e11f R14: 00007f899a941300 R15: 0000000000022000 23:31:51 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 4) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:31:51 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 3) [ 2253.192037] FAULT_INJECTION: forcing a failure. [ 2253.192037] name failslab, interval 1, probability 0, space 0, times 0 [ 2253.193164] CPU: 0 PID: 11962 Comm: syz-executor.7 Not tainted 5.10.224 #1 [ 2253.193929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2253.194703] Call Trace: [ 2253.194958] dump_stack+0x107/0x167 [ 2253.195301] should_fail.cold+0x5/0xa [ 2253.195665] ? create_object.isra.0+0x3a/0xa20 [ 2253.196097] should_failslab+0x5/0x20 [ 2253.196463] kmem_cache_alloc+0x5b/0x310 [ 2253.196857] create_object.isra.0+0x3a/0xa20 [ 2253.197281] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2253.197763] kmem_cache_alloc_trace+0x151/0x320 [ 2253.198211] alloc_pipe_info+0x10a/0x590 [ 2253.198611] splice_direct_to_actor+0x774/0x980 [ 2253.199055] ? _cond_resched+0x12/0x80 [ 2253.199428] ? inode_security+0x107/0x140 [ 2253.199814] ? pipe_to_sendpage+0x380/0x380 [ 2253.200225] ? avc_policy_seqno+0x9/0x70 [ 2253.200615] ? selinux_file_permission+0x92/0x520 [ 2253.201065] ? do_splice_to+0x160/0x160 [ 2253.201451] ? security_file_permission+0xb1/0xe0 [ 2253.201956] do_splice_direct+0x1c4/0x290 [ 2253.202355] ? splice_direct_to_actor+0x980/0x980 [ 2253.202807] ? avc_policy_seqno+0x9/0x70 [ 2253.203201] ? security_file_permission+0xb1/0xe0 [ 2253.203669] do_sendfile+0x553/0x11e0 [ 2253.204036] ? do_pwritev+0x270/0x270 [ 2253.204404] ? wait_for_completion_io+0x270/0x270 [ 2253.204860] ? rcu_read_lock_any_held+0x75/0xa0 [ 2253.205302] ? vfs_write+0x354/0xb10 [ 2253.205670] __x64_sys_sendfile64+0x1d1/0x210 [ 2253.206095] ? __ia32_sys_sendfile+0x220/0x220 [ 2253.206536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2253.207021] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2253.207510] do_syscall_64+0x33/0x40 [ 2253.207866] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2253.208360] RIP: 0033:0x7f0361883b19 [ 2253.208723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2253.210433] RSP: 002b:00007f035edf9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2253.211206] RAX: ffffffffffffffda RBX: 00007f0361996f60 RCX: 00007f0361883b19 [ 2253.211867] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2253.212539] RBP: 00007f035edf91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2253.213201] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2253.213875] R13: 00007fffbfc0e05f R14: 00007f035edf9300 R15: 0000000000022000 23:31:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 5) [ 2253.299258] FAULT_INJECTION: forcing a failure. [ 2253.299258] name failslab, interval 1, probability 0, space 0, times 0 [ 2253.300603] CPU: 0 PID: 11971 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 2253.301350] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2253.302198] Call Trace: [ 2253.302475] dump_stack+0x107/0x167 [ 2253.302836] should_fail.cold+0x5/0xa [ 2253.302875] FAULT_INJECTION: forcing a failure. [ 2253.302875] name failslab, interval 1, probability 0, space 0, times 0 [ 2253.303223] ? iter_file_splice_write+0x16d/0xc30 [ 2253.303244] ? iter_file_splice_write+0x16d/0xc30 [ 2253.303271] should_failslab+0x5/0x20 [ 2253.303300] __kmalloc+0x72/0x390 [ 2253.306033] iter_file_splice_write+0x16d/0xc30 [ 2253.306478] ? atime_needs_update+0x600/0x600 [ 2253.306907] ? generic_splice_sendpage+0x140/0x140 [ 2253.307384] ? pipe_to_user+0x170/0x170 [ 2253.307777] ? security_file_permission+0xb1/0xe0 [ 2253.308226] ? generic_splice_sendpage+0x140/0x140 [ 2253.308691] direct_splice_actor+0x10f/0x170 [ 2253.309099] splice_direct_to_actor+0x387/0x980 [ 2253.309541] ? pipe_to_sendpage+0x380/0x380 [ 2253.309947] ? do_splice_to+0x160/0x160 [ 2253.310327] ? security_file_permission+0xb1/0xe0 [ 2253.310785] do_splice_direct+0x1c4/0x290 [ 2253.311174] ? splice_direct_to_actor+0x980/0x980 [ 2253.311653] ? avc_policy_seqno+0x9/0x70 [ 2253.312024] ? security_file_permission+0xb1/0xe0 [ 2253.312485] do_sendfile+0x553/0x11e0 [ 2253.312847] ? do_pwritev+0x270/0x270 [ 2253.313200] ? wait_for_completion_io+0x270/0x270 [ 2253.313661] ? rcu_read_lock_any_held+0x75/0xa0 [ 2253.314088] ? vfs_write+0x354/0xb10 [ 2253.314443] __x64_sys_sendfile64+0x1d1/0x210 [ 2253.314863] ? __ia32_sys_sendfile+0x220/0x220 [ 2253.315292] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2253.315784] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2253.316264] do_syscall_64+0x33/0x40 [ 2253.316615] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2253.317184] RIP: 0033:0x7f899d3cbb19 [ 2253.317540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2253.319259] RSP: 002b:00007f899a941188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2253.319977] RAX: ffffffffffffffda RBX: 00007f899d4def60 RCX: 00007f899d3cbb19 [ 2253.320662] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2253.321332] RBP: 00007f899a9411d0 R08: 0000000000000000 R09: 0000000000000000 [ 2253.322030] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2253.322703] R13: 00007ffc2a56e11f R14: 00007f899a941300 R15: 0000000000022000 [ 2253.323418] CPU: 1 PID: 11973 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2253.324124] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2253.324903] Call Trace: [ 2253.325166] dump_stack+0x107/0x167 [ 2253.325515] should_fail.cold+0x5/0xa [ 2253.325890] ? __d_alloc+0x2a/0x990 [ 2253.326243] should_failslab+0x5/0x20 [ 2253.326609] kmem_cache_alloc+0x5b/0x310 [ 2253.327000] ? __d_lookup+0x3bf/0x760 [ 2253.327373] __d_alloc+0x2a/0x990 [ 2253.327709] d_alloc+0x46/0x1c0 [ 2253.328112] __lookup_hash+0xcc/0x190 [ 2253.328471] filename_create+0x186/0x4a0 [ 2253.328848] ? filename_parentat+0x570/0x570 [ 2253.329264] ? getname_flags.part.0+0x1dd/0x4f0 [ 2253.329712] do_mkdirat+0xa2/0x2b0 [ 2253.330052] ? user_path_create+0xf0/0xf0 [ 2253.330456] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2253.330951] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2253.331445] do_syscall_64+0x33/0x40 [ 2253.331794] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2253.332279] RIP: 0033:0x7f0c1cebab19 [ 2253.332627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2253.334323] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2253.335025] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2253.335682] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2253.336338] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2253.336991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2253.337651] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 23:31:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 6) [ 2253.375657] FAULT_INJECTION: forcing a failure. [ 2253.375657] name failslab, interval 1, probability 0, space 0, times 0 [ 2253.376810] CPU: 1 PID: 11967 Comm: syz-executor.5 Not tainted 5.10.224 #1 [ 2253.377487] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2253.378291] Call Trace: [ 2253.378575] dump_stack+0x107/0x167 [ 2253.378952] should_fail.cold+0x5/0xa [ 2253.379346] ? alloc_pipe_info+0x1e5/0x590 [ 2253.379788] should_failslab+0x5/0x20 [ 2253.380192] __kmalloc+0x72/0x390 [ 2253.380557] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2253.381061] alloc_pipe_info+0x1e5/0x590 [ 2253.381472] splice_direct_to_actor+0x774/0x980 [ 2253.381959] ? _cond_resched+0x12/0x80 [ 2253.382353] ? inode_security+0x107/0x140 [ 2253.382751] ? pipe_to_sendpage+0x380/0x380 [ 2253.383160] ? avc_policy_seqno+0x9/0x70 [ 2253.383542] ? selinux_file_permission+0x92/0x520 [ 2253.383992] ? do_splice_to+0x160/0x160 [ 2253.384375] ? security_file_permission+0xb1/0xe0 [ 2253.384827] do_splice_direct+0x1c4/0x290 [ 2253.385218] ? splice_direct_to_actor+0x980/0x980 [ 2253.385669] ? avc_policy_seqno+0x9/0x70 [ 2253.386063] ? security_file_permission+0xb1/0xe0 [ 2253.386512] do_sendfile+0x553/0x11e0 [ 2253.386846] ? do_pwritev+0x270/0x270 [ 2253.387176] ? wait_for_completion_io+0x270/0x270 [ 2253.387592] ? rcu_read_lock_any_held+0x75/0xa0 [ 2253.388011] ? vfs_write+0x354/0xb10 [ 2253.388367] __x64_sys_sendfile64+0x1d1/0x210 [ 2253.388785] ? __ia32_sys_sendfile+0x220/0x220 [ 2253.389216] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2253.389661] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2253.390109] do_syscall_64+0x33/0x40 [ 2253.390428] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2253.390863] RIP: 0033:0x7fb2ec3f9b19 [ 2253.391182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2253.392797] RSP: 002b:00007fb2e996f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2253.393496] RAX: ffffffffffffffda RBX: 00007fb2ec50cf60 RCX: 00007fb2ec3f9b19 [ 2253.394146] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2253.394798] RBP: 00007fb2e996f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2253.395449] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2253.396093] R13: 00007ffdb4f283cf R14: 00007fb2e996f300 R15: 0000000000022000 [ 2253.419089] cgroup: Unknown subsys name 'perf_event' [ 2253.423212] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2253.484887] FAULT_INJECTION: forcing a failure. [ 2253.484887] name failslab, interval 1, probability 0, space 0, times 0 [ 2253.486218] CPU: 1 PID: 11975 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 2253.486889] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2253.487688] Call Trace: [ 2253.487953] dump_stack+0x107/0x167 [ 2253.488306] should_fail.cold+0x5/0xa [ 2253.488680] ? create_object.isra.0+0x3a/0xa20 [ 2253.489131] should_failslab+0x5/0x20 [ 2253.489497] kmem_cache_alloc+0x5b/0x310 [ 2253.489909] create_object.isra.0+0x3a/0xa20 [ 2253.490337] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2253.490821] __kmalloc+0x16e/0x390 [ 2253.491158] iter_file_splice_write+0x16d/0xc30 [ 2253.491592] ? atime_needs_update+0x600/0x600 [ 2253.491982] ? generic_splice_sendpage+0x140/0x140 [ 2253.492396] ? pipe_to_user+0x170/0x170 [ 2253.492754] ? security_file_permission+0xb1/0xe0 [ 2253.493166] ? generic_splice_sendpage+0x140/0x140 [ 2253.493582] direct_splice_actor+0x10f/0x170 [ 2253.493965] splice_direct_to_actor+0x387/0x980 [ 2253.494364] ? pipe_to_sendpage+0x380/0x380 [ 2253.495120] ? do_splice_to+0x160/0x160 [ 2253.495508] ? security_file_permission+0xb1/0xe0 [ 2253.495981] do_splice_direct+0x1c4/0x290 [ 2253.496923] ? splice_direct_to_actor+0x980/0x980 [ 2253.497446] ? avc_policy_seqno+0x9/0x70 [ 2253.497977] ? security_file_permission+0xb1/0xe0 [ 2253.498938] do_sendfile+0x553/0x11e0 [ 2253.499755] ? do_pwritev+0x270/0x270 [ 2253.500640] ? wait_for_completion_io+0x270/0x270 [ 2253.501758] ? rcu_read_lock_any_held+0x75/0xa0 [ 2253.502805] ? vfs_write+0x354/0xb10 [ 2253.503490] __x64_sys_sendfile64+0x1d1/0x210 [ 2253.504515] ? __ia32_sys_sendfile+0x220/0x220 [ 2253.505567] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2253.506779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2253.507950] do_syscall_64+0x33/0x40 [ 2253.508802] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2253.509955] RIP: 0033:0x7f899d3cbb19 [ 2253.510346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2253.514571] RSP: 002b:00007f899a941188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2253.515894] RAX: ffffffffffffffda RBX: 00007f899d4def60 RCX: 00007f899d3cbb19 [ 2253.517519] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2253.519147] RBP: 00007f899a9411d0 R08: 0000000000000000 R09: 0000000000000000 [ 2253.520761] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2253.522383] R13: 00007ffc2a56e11f R14: 00007f899a941300 R15: 0000000000022000 23:32:05 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 3) 23:32:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 3) 23:32:05 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 4) 23:32:05 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:32:05 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 3) 23:32:05 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 5) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:32:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 7) 23:32:05 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 3) [ 2266.741164] FAULT_INJECTION: forcing a failure. [ 2266.741164] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.744205] CPU: 1 PID: 11993 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2266.745854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2266.747835] Call Trace: [ 2266.748471] dump_stack+0x107/0x167 [ 2266.749328] should_fail.cold+0x5/0xa [ 2266.750248] ? create_object.isra.0+0x3a/0xa20 [ 2266.751343] should_failslab+0x5/0x20 [ 2266.752255] kmem_cache_alloc+0x5b/0x310 [ 2266.753223] create_object.isra.0+0x3a/0xa20 [ 2266.754279] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2266.755484] kmem_cache_alloc+0x159/0x310 [ 2266.756468] ? __d_lookup+0x3bf/0x760 [ 2266.757377] __d_alloc+0x2a/0x990 [ 2266.758216] d_alloc+0x46/0x1c0 [ 2266.759019] __lookup_hash+0xcc/0x190 [ 2266.759928] filename_create+0x186/0x4a0 [ 2266.760904] ? filename_parentat+0x570/0x570 [ 2266.761968] ? getname_flags.part.0+0x1dd/0x4f0 [ 2266.763082] do_mkdirat+0xa2/0x2b0 [ 2266.763922] ? user_path_create+0xf0/0xf0 [ 2266.764910] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2266.766181] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2266.767423] do_syscall_64+0x33/0x40 [ 2266.768307] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2266.769533] RIP: 0033:0x7f0c1cebab19 [ 2266.770400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2266.774492] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2266.776192] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2266.777799] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2266.779449] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2266.781080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2266.782727] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2266.802482] cgroup: Unknown subsys name 'perf_event' [ 2266.812879] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2266.817340] FAULT_INJECTION: forcing a failure. [ 2266.817340] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.819654] CPU: 0 PID: 12009 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 2266.820425] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2266.821352] Call Trace: [ 2266.821653] dump_stack+0x107/0x167 [ 2266.822103] should_fail.cold+0x5/0xa [ 2266.822520] ? alloc_pipe_info+0x1e5/0x590 [ 2266.823070] should_failslab+0x5/0x20 [ 2266.823478] __kmalloc+0x72/0x390 [ 2266.824173] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2266.825489] alloc_pipe_info+0x1e5/0x590 [ 2266.826764] splice_direct_to_actor+0x774/0x980 [ 2266.828015] ? _cond_resched+0x12/0x80 [ 2266.829008] ? inode_security+0x107/0x140 [ 2266.830086] ? pipe_to_sendpage+0x380/0x380 [ 2266.831180] ? avc_policy_seqno+0x9/0x70 [ 2266.832211] ? selinux_file_permission+0x92/0x520 [ 2266.833396] ? do_splice_to+0x160/0x160 [ 2266.834919] ? security_file_permission+0xb1/0xe0 [ 2266.835444] do_splice_direct+0x1c4/0x290 [ 2266.835818] ? splice_direct_to_actor+0x980/0x980 [ 2266.836245] ? avc_policy_seqno+0x9/0x70 [ 2266.836611] ? security_file_permission+0xb1/0xe0 [ 2266.837045] do_sendfile+0x553/0x11e0 [ 2266.837397] ? do_pwritev+0x270/0x270 [ 2266.837745] ? wait_for_completion_io+0x270/0x270 [ 2266.838199] ? rcu_read_lock_any_held+0x75/0xa0 [ 2266.838610] ? vfs_write+0x354/0xb10 [ 2266.838946] __x64_sys_sendfile64+0x1d1/0x210 [ 2266.839428] ? __ia32_sys_sendfile+0x220/0x220 [ 2266.839831] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2266.840296] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2266.840746] do_syscall_64+0x33/0x40 [ 2266.841073] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2266.841522] RIP: 0033:0x7fda184cab19 [ 2266.841846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2266.843517] RSP: 002b:00007fda15a1f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2266.844177] RAX: ffffffffffffffda RBX: 00007fda185de020 RCX: 00007fda184cab19 [ 2266.844793] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 2266.845409] RBP: 00007fda15a1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2266.846031] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2266.846656] R13: 00007ffc0f97e54f R14: 00007fda15a1f300 R15: 0000000000022000 [ 2266.850804] FAULT_INJECTION: forcing a failure. [ 2266.850804] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.851981] CPU: 1 PID: 12011 Comm: syz-executor.5 Not tainted 5.10.224 #1 [ 2266.852647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2266.853448] Call Trace: [ 2266.853712] dump_stack+0x107/0x167 [ 2266.854083] should_fail.cold+0x5/0xa [ 2266.854459] ? create_object.isra.0+0x3a/0xa20 [ 2266.854900] should_failslab+0x5/0x20 [ 2266.855280] kmem_cache_alloc+0x5b/0x310 [ 2266.855597] FAULT_INJECTION: forcing a failure. [ 2266.855597] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.855684] create_object.isra.0+0x3a/0xa20 [ 2266.857111] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2266.857610] __kmalloc+0x16e/0x390 [ 2266.857961] alloc_pipe_info+0x1e5/0x590 [ 2266.858358] splice_direct_to_actor+0x774/0x980 [ 2266.858800] ? _cond_resched+0x12/0x80 [ 2266.859169] ? inode_security+0x107/0x140 [ 2266.859564] ? pipe_to_sendpage+0x380/0x380 [ 2266.859989] ? avc_policy_seqno+0x9/0x70 [ 2266.860379] ? selinux_file_permission+0x92/0x520 [ 2266.860834] ? do_splice_to+0x160/0x160 [ 2266.861219] ? security_file_permission+0xb1/0xe0 [ 2266.861683] do_splice_direct+0x1c4/0x290 [ 2266.862077] ? splice_direct_to_actor+0x980/0x980 [ 2266.862532] ? avc_policy_seqno+0x9/0x70 [ 2266.862917] ? security_file_permission+0xb1/0xe0 [ 2266.863387] do_sendfile+0x553/0x11e0 [ 2266.863759] ? do_pwritev+0x270/0x270 [ 2266.864123] ? wait_for_completion_io+0x270/0x270 [ 2266.864582] ? rcu_read_lock_any_held+0x75/0xa0 [ 2266.865016] ? vfs_write+0x354/0xb10 [ 2266.865380] __x64_sys_sendfile64+0x1d1/0x210 [ 2266.865798] ? __ia32_sys_sendfile+0x220/0x220 [ 2266.866241] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2266.866732] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2266.867215] do_syscall_64+0x33/0x40 [ 2266.867567] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2266.868042] RIP: 0033:0x7fb2ec3f9b19 [ 2266.868397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2266.870154] RSP: 002b:00007fb2e994e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2266.870882] RAX: ffffffffffffffda RBX: 00007fb2ec50d020 RCX: 00007fb2ec3f9b19 [ 2266.871593] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000006 [ 2266.872803] RBP: 00007fb2e994e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2266.873475] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2266.874152] R13: 00007ffdb4f283cf R14: 00007fb2e994e300 R15: 0000000000022000 [ 2266.886051] CPU: 0 PID: 12017 Comm: syz-executor.7 Not tainted 5.10.224 #1 [ 2266.886662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2266.887373] Call Trace: [ 2266.887613] dump_stack+0x107/0x167 [ 2266.887935] should_fail.cold+0x5/0xa [ 2266.888279] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2266.888738] should_failslab+0x5/0x20 [ 2266.889073] __kmalloc_node+0x76/0x420 [ 2266.889431] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2266.889885] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 2266.890382] ? trace_hardirqs_on+0x5b/0x180 [ 2266.890804] kmem_cache_alloc_trace+0x169/0x320 [ 2266.891936] alloc_pipe_info+0x10a/0x590 [ 2266.892338] splice_direct_to_actor+0x774/0x980 [ 2266.892790] ? _cond_resched+0x12/0x80 [ 2266.893165] ? inode_security+0x107/0x140 [ 2266.893566] ? pipe_to_sendpage+0x380/0x380 [ 2266.898007] ? avc_policy_seqno+0x9/0x70 [ 2266.898412] ? selinux_file_permission+0x92/0x520 [ 2266.898754] FAULT_INJECTION: forcing a failure. [ 2266.898754] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.898872] ? do_splice_to+0x160/0x160 [ 2266.900287] ? security_file_permission+0xb1/0xe0 [ 2266.900749] do_splice_direct+0x1c4/0x290 [ 2266.901145] ? splice_direct_to_actor+0x980/0x980 [ 2266.901601] ? avc_policy_seqno+0x9/0x70 [ 2266.901999] ? security_file_permission+0xb1/0xe0 [ 2266.902471] do_sendfile+0x553/0x11e0 [ 2266.902844] ? do_pwritev+0x270/0x270 [ 2266.903211] ? wait_for_completion_io+0x270/0x270 [ 2266.903637] ? rcu_read_lock_any_held+0x75/0xa0 [ 2266.904072] ? vfs_write+0x354/0xb10 [ 2266.904428] __x64_sys_sendfile64+0x1d1/0x210 [ 2266.904817] ? __ia32_sys_sendfile+0x220/0x220 [ 2266.905217] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2266.910172] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2266.910616] do_syscall_64+0x33/0x40 [ 2266.910943] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2266.911384] RIP: 0033:0x7f0361883b19 [ 2266.911707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2266.918117] RSP: 002b:00007f035edd8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2266.922025] RAX: ffffffffffffffda RBX: 00007f0361997020 RCX: 00007f0361883b19 [ 2266.922692] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 2266.923353] RBP: 00007f035edd81d0 R08: 0000000000000000 R09: 0000000000000000 [ 2266.924011] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2266.924678] R13: 00007fffbfc0e05f R14: 00007f035edd8300 R15: 0000000000022000 [ 2266.925358] CPU: 1 PID: 11988 Comm: syz-executor.2 Not tainted 5.10.224 #1 [ 2266.926023] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2266.926799] Call Trace: [ 2266.927045] dump_stack+0x107/0x167 [ 2266.927392] should_fail.cold+0x5/0xa [ 2266.927751] ? alloc_pipe_info+0x1e5/0x590 [ 2266.928143] should_failslab+0x5/0x20 [ 2266.928504] __kmalloc+0x72/0x390 [ 2266.928828] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2266.929305] alloc_pipe_info+0x1e5/0x590 [ 2266.929859] splice_direct_to_actor+0x774/0x980 [ 2266.930459] ? _cond_resched+0x12/0x80 [ 2266.930825] ? inode_security+0x107/0x140 [ 2266.931214] ? pipe_to_sendpage+0x380/0x380 [ 2266.931622] ? avc_policy_seqno+0x9/0x70 [ 2266.931991] ? selinux_file_permission+0x92/0x520 [ 2266.932461] ? do_splice_to+0x160/0x160 [ 2266.932846] ? security_file_permission+0xb1/0xe0 [ 2266.933486] do_splice_direct+0x1c4/0x290 [ 2266.933880] ? splice_direct_to_actor+0x980/0x980 [ 2266.934448] ? avc_policy_seqno+0x9/0x70 [ 2266.934979] ? security_file_permission+0xb1/0xe0 [ 2266.935437] do_sendfile+0x553/0x11e0 [ 2266.935932] ? do_pwritev+0x270/0x270 [ 2266.936296] ? wait_for_completion_io+0x270/0x270 [ 2266.936898] ? rcu_read_lock_any_held+0x75/0xa0 [ 2266.937358] ? vfs_write+0x354/0xb10 [ 2266.937722] __x64_sys_sendfile64+0x1d1/0x210 [ 2266.938328] ? __ia32_sys_sendfile+0x220/0x220 [ 2266.938830] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2266.939337] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2266.939995] do_syscall_64+0x33/0x40 [ 2266.940379] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2266.940942] RIP: 0033:0x7ff7be6abb19 [ 2266.941317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2266.943401] RSP: 002b:00007ff7bbc21188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2266.944259] RAX: ffffffffffffffda RBX: 00007ff7be7bef60 RCX: 00007ff7be6abb19 [ 2266.945162] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000006 [ 2266.945832] RBP: 00007ff7bbc211d0 R08: 0000000000000000 R09: 0000000000000000 [ 2266.946509] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2266.947177] R13: 00007fff3e2a8ebf R14: 00007ff7bbc21300 R15: 0000000000022000 [ 2266.962670] FAULT_INJECTION: forcing a failure. [ 2266.962670] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.964052] CPU: 1 PID: 12016 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2266.964401] FAULT_INJECTION: forcing a failure. [ 2266.964401] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.964711] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2266.964716] Call Trace: [ 2266.964739] dump_stack+0x107/0x167 [ 2266.964769] should_fail.cold+0x5/0xa [ 2266.967597] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2266.968100] should_failslab+0x5/0x20 [ 2266.968470] __kmalloc_node+0x76/0x420 [ 2266.968847] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2266.969343] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 2266.969812] ? trace_hardirqs_on+0x5b/0x180 [ 2266.970243] kmem_cache_alloc_trace+0x169/0x320 [ 2266.970701] alloc_pipe_info+0x10a/0x590 [ 2266.971100] splice_direct_to_actor+0x774/0x980 [ 2266.971542] ? _cond_resched+0x12/0x80 [ 2266.971912] ? inode_security+0x107/0x140 [ 2266.972300] ? pipe_to_sendpage+0x380/0x380 [ 2266.972716] ? avc_policy_seqno+0x9/0x70 [ 2266.973146] ? selinux_file_permission+0x92/0x520 [ 2266.973612] ? do_splice_to+0x160/0x160 [ 2266.973991] ? security_file_permission+0xb1/0xe0 [ 2266.974453] do_splice_direct+0x1c4/0x290 [ 2266.974837] ? splice_direct_to_actor+0x980/0x980 [ 2266.975290] ? avc_policy_seqno+0x9/0x70 [ 2266.975679] ? security_file_permission+0xb1/0xe0 [ 2266.976799] do_sendfile+0x553/0x11e0 [ 2266.977664] ? do_pwritev+0x270/0x270 [ 2266.978027] ? wait_for_completion_io+0x270/0x270 [ 2266.978489] ? rcu_read_lock_any_held+0x75/0xa0 [ 2266.978933] ? vfs_write+0x354/0xb10 [ 2266.979295] __x64_sys_sendfile64+0x1d1/0x210 [ 2266.979720] ? __ia32_sys_sendfile+0x220/0x220 [ 2266.980145] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2266.980642] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2266.981122] do_syscall_64+0x33/0x40 [ 2266.981474] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2266.981957] RIP: 0033:0x7f9efa275b19 [ 2266.982309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2266.984023] RSP: 002b:00007f9ef77ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2266.984735] RAX: ffffffffffffffda RBX: 00007f9efa389020 RCX: 00007f9efa275b19 [ 2266.985406] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000006 [ 2266.986085] RBP: 00007f9ef77ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2266.986747] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2266.987413] R13: 00007ffd4750adbf R14: 00007f9ef77ca300 R15: 0000000000022000 [ 2266.989989] CPU: 0 PID: 12014 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 2266.990645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2266.991421] Call Trace: [ 2266.991678] dump_stack+0x107/0x167 [ 2266.992017] should_fail.cold+0x5/0xa [ 2266.992382] ? iter_file_splice_write+0x16d/0xc30 [ 2266.992834] should_failslab+0x5/0x20 [ 2266.993194] __kmalloc+0x72/0x390 [ 2267.006281] iter_file_splice_write+0x16d/0xc30 [ 2267.006674] ? atime_needs_update+0x600/0x600 [ 2267.007066] ? generic_splice_sendpage+0x140/0x140 [ 2267.007477] ? pipe_to_user+0x170/0x170 [ 2267.007833] ? security_file_permission+0xb1/0xe0 [ 2267.008242] ? generic_splice_sendpage+0x140/0x140 [ 2267.008654] direct_splice_actor+0x10f/0x170 [ 2267.009026] splice_direct_to_actor+0x387/0x980 [ 2267.009419] ? pipe_to_sendpage+0x380/0x380 [ 2267.009789] ? do_splice_to+0x160/0x160 [ 2267.010144] ? security_file_permission+0xb1/0xe0 [ 2267.010553] do_splice_direct+0x1c4/0x290 [ 2267.010905] ? splice_direct_to_actor+0x980/0x980 [ 2267.011313] ? avc_policy_seqno+0x9/0x70 [ 2267.011664] ? security_file_permission+0xb1/0xe0 [ 2267.012085] do_sendfile+0x553/0x11e0 [ 2267.012419] ? do_pwritev+0x270/0x270 [ 2267.012747] ? setup_APIC_eilvt+0x2f0/0x2f0 [ 2267.013128] ? tick_program_event+0xa8/0x140 [ 2267.013510] __x64_sys_sendfile64+0x1d1/0x210 [ 2267.013901] ? __ia32_sys_sendfile+0x220/0x220 [ 2267.014294] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2267.014738] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2267.015174] do_syscall_64+0x33/0x40 [ 2267.015488] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2267.015920] RIP: 0033:0x7f899d3cbb19 [ 2267.016236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2267.017763] RSP: 002b:00007f899a920188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2267.018408] RAX: ffffffffffffffda RBX: 00007f899d4df020 RCX: 00007f899d3cbb19 [ 2267.019005] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000005 [ 2267.019599] RBP: 00007f899a9201d0 R08: 0000000000000000 R09: 0000000000000000 [ 2267.020195] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2267.020790] R13: 00007ffc2a56e11f R14: 00007f899a920300 R15: 0000000000022000 23:32:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 4) [ 2267.134576] FAULT_INJECTION: forcing a failure. [ 2267.134576] name failslab, interval 1, probability 0, space 0, times 0 [ 2267.136104] CPU: 1 PID: 12020 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 2267.136867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2267.137644] Call Trace: [ 2267.137910] dump_stack+0x107/0x167 [ 2267.138299] should_fail.cold+0x5/0xa [ 2267.138712] ? create_object.isra.0+0x3a/0xa20 [ 2267.139201] should_failslab+0x5/0x20 [ 2267.139606] kmem_cache_alloc+0x5b/0x310 [ 2267.140027] ? create_object.isra.0+0x3ad/0xa20 [ 2267.140509] create_object.isra.0+0x3a/0xa20 [ 2267.140974] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2267.141505] __kmalloc_node+0x1ae/0x420 [ 2267.141911] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2267.142412] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 2267.142901] ? trace_hardirqs_on+0x5b/0x180 [ 2267.143328] kmem_cache_alloc_trace+0x169/0x320 [ 2267.143781] alloc_pipe_info+0x10a/0x590 [ 2267.144181] splice_direct_to_actor+0x774/0x980 [ 2267.144643] ? _cond_resched+0x12/0x80 [ 2267.145021] ? inode_security+0x107/0x140 [ 2267.145421] ? pipe_to_sendpage+0x380/0x380 [ 2267.145847] ? avc_policy_seqno+0x9/0x70 [ 2267.146253] ? selinux_file_permission+0x92/0x520 [ 2267.146721] ? do_splice_to+0x160/0x160 [ 2267.147140] ? security_file_permission+0xb1/0xe0 [ 2267.147607] do_splice_direct+0x1c4/0x290 [ 2267.148007] ? splice_direct_to_actor+0x980/0x980 [ 2267.148472] ? avc_policy_seqno+0x9/0x70 [ 2267.148871] ? security_file_permission+0xb1/0xe0 [ 2267.149344] do_sendfile+0x553/0x11e0 [ 2267.149720] ? do_pwritev+0x270/0x270 [ 2267.150103] ? wait_for_completion_io+0x270/0x270 [ 2267.150566] ? rcu_read_lock_any_held+0x75/0xa0 [ 2267.151002] ? vfs_write+0x354/0xb10 [ 2267.151362] __x64_sys_sendfile64+0x1d1/0x210 [ 2267.151790] ? __ia32_sys_sendfile+0x220/0x220 [ 2267.152231] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2267.152745] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2267.153235] do_syscall_64+0x33/0x40 [ 2267.153587] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2267.154075] RIP: 0033:0x7fda184cab19 [ 2267.154431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2267.156157] RSP: 002b:00007fda15a40188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2267.156882] RAX: ffffffffffffffda RBX: 00007fda185ddf60 RCX: 00007fda184cab19 [ 2267.157629] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2267.158321] RBP: 00007fda15a401d0 R08: 0000000000000000 R09: 0000000000000000 [ 2267.158999] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2267.159673] R13: 00007ffc0f97e54f R14: 00007fda15a40300 R15: 0000000000022000 23:32:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 5) 23:32:20 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 4) 23:32:20 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 6) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:32:20 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 5) 23:32:20 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 4) 23:32:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 8) 23:32:20 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:32:20 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 4) [ 2282.072189] FAULT_INJECTION: forcing a failure. [ 2282.072189] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.073506] CPU: 1 PID: 12024 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2282.074148] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.074892] Call Trace: [ 2282.075124] dump_stack+0x107/0x167 [ 2282.075433] should_fail.cold+0x5/0xa [ 2282.075814] ? cgroup_mkdir+0x254/0xf50 [ 2282.076162] should_failslab+0x5/0x20 [ 2282.076486] __kmalloc+0x72/0x390 [ 2282.076856] cgroup_mkdir+0x254/0xf50 [ 2282.077184] ? cgroup_destroy_locked+0x710/0x710 [ 2282.077587] kernfs_iop_mkdir+0x14d/0x1e0 [ 2282.078044] vfs_mkdir+0x493/0x750 [ 2282.078362] do_mkdirat+0x150/0x2b0 [ 2282.078671] ? user_path_create+0xf0/0xf0 [ 2282.079223] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.079666] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.080186] do_syscall_64+0x33/0x40 [ 2282.080503] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.080977] RIP: 0033:0x7f0c1cebab19 [ 2282.081292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.083026] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2282.083663] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2282.084450] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2282.085162] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.085800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2282.086522] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2282.096674] cgroup: Unknown subsys name 'perf_event' [ 2282.111164] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2282.118277] FAULT_INJECTION: forcing a failure. [ 2282.118277] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.119306] CPU: 0 PID: 12031 Comm: syz-executor.2 Not tainted 5.10.224 #1 [ 2282.119888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.120582] Call Trace: [ 2282.120816] dump_stack+0x107/0x167 [ 2282.121130] should_fail.cold+0x5/0xa [ 2282.121462] ? create_object.isra.0+0x3a/0xa20 [ 2282.121859] should_failslab+0x5/0x20 [ 2282.122213] kmem_cache_alloc+0x5b/0x310 [ 2282.122563] create_object.isra.0+0x3a/0xa20 [ 2282.122940] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2282.123371] __kmalloc+0x16e/0x390 [ 2282.123685] alloc_pipe_info+0x1e5/0x590 [ 2282.124037] splice_direct_to_actor+0x774/0x980 [ 2282.124438] ? _cond_resched+0x12/0x80 [ 2282.124773] ? inode_security+0x107/0x140 [ 2282.125126] ? pipe_to_sendpage+0x380/0x380 [ 2282.125497] ? avc_policy_seqno+0x9/0x70 [ 2282.125843] ? selinux_file_permission+0x92/0x520 [ 2282.126275] ? do_splice_to+0x160/0x160 [ 2282.126622] ? security_file_permission+0xb1/0xe0 [ 2282.127038] do_splice_direct+0x1c4/0x290 [ 2282.127392] ? splice_direct_to_actor+0x980/0x980 [ 2282.127801] ? avc_policy_seqno+0x9/0x70 [ 2282.128155] ? security_file_permission+0xb1/0xe0 [ 2282.128575] do_sendfile+0x553/0x11e0 [ 2282.128915] ? do_pwritev+0x270/0x270 [ 2282.129244] ? wait_for_completion_io+0x270/0x270 [ 2282.129661] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.130067] ? vfs_write+0x354/0xb10 [ 2282.130403] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.130980] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.131373] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.131811] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.132247] do_syscall_64+0x33/0x40 [ 2282.132561] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.132991] RIP: 0033:0x7ff7be6abb19 [ 2282.133306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.134854] RSP: 002b:00007ff7bbc21188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.135496] RAX: ffffffffffffffda RBX: 00007ff7be7bef60 RCX: 00007ff7be6abb19 [ 2282.136097] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2282.136698] RBP: 00007ff7bbc211d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.137302] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.137904] R13: 00007fff3e2a8ebf R14: 00007ff7bbc21300 R15: 0000000000022000 [ 2282.143226] FAULT_INJECTION: forcing a failure. [ 2282.143226] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.144233] CPU: 0 PID: 12025 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 2282.144813] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.145511] Call Trace: [ 2282.145765] dump_stack+0x107/0x167 [ 2282.146117] should_fail.cold+0x5/0xa [ 2282.146481] ? iter_file_splice_write+0x16d/0xc30 [ 2282.146925] should_failslab+0x5/0x20 [ 2282.147270] __kmalloc+0x72/0x390 [ 2282.147603] iter_file_splice_write+0x16d/0xc30 [ 2282.148029] ? atime_needs_update+0x600/0x600 [ 2282.148452] ? generic_splice_sendpage+0x140/0x140 [ 2282.148828] FAULT_INJECTION: forcing a failure. [ 2282.148828] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.148904] ? pipe_to_user+0x170/0x170 [ 2282.148952] ? security_file_permission+0xb1/0xe0 [ 2282.148988] ? generic_splice_sendpage+0x140/0x140 [ 2282.151188] direct_splice_actor+0x10f/0x170 [ 2282.151567] splice_direct_to_actor+0x387/0x980 [ 2282.151970] ? pipe_to_sendpage+0x380/0x380 [ 2282.152343] ? do_splice_to+0x160/0x160 [ 2282.152686] ? security_file_permission+0xb1/0xe0 [ 2282.153106] do_splice_direct+0x1c4/0x290 [ 2282.153460] ? splice_direct_to_actor+0x980/0x980 [ 2282.153868] ? avc_policy_seqno+0x9/0x70 [ 2282.154251] ? security_file_permission+0xb1/0xe0 [ 2282.154672] do_sendfile+0x553/0x11e0 [ 2282.155011] ? do_pwritev+0x270/0x270 [ 2282.155341] ? wait_for_completion_io+0x270/0x270 [ 2282.155756] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.156157] ? vfs_write+0x354/0xb10 [ 2282.156483] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.156869] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.157273] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.157722] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.158180] do_syscall_64+0x33/0x40 [ 2282.158500] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.158933] RIP: 0033:0x7fda184cab19 [ 2282.159251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.160799] RSP: 002b:00007fda15a40188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.161445] RAX: ffffffffffffffda RBX: 00007fda185ddf60 RCX: 00007fda184cab19 [ 2282.162044] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2282.162666] RBP: 00007fda15a401d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.163276] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.163874] R13: 00007ffc0f97e54f R14: 00007fda15a40300 R15: 0000000000022000 [ 2282.166856] CPU: 1 PID: 12048 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 2282.167565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.168462] Call Trace: [ 2282.168730] dump_stack+0x107/0x167 [ 2282.169176] should_fail.cold+0x5/0xa [ 2282.169505] ? create_object.isra.0+0x3a/0xa20 [ 2282.170246] should_failslab+0x5/0x20 [ 2282.170574] kmem_cache_alloc+0x5b/0x310 [ 2282.170993] create_object.isra.0+0x3a/0xa20 [ 2282.171380] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2282.171867] kmem_cache_alloc+0x159/0x310 [ 2282.172225] jbd2__journal_start+0x190/0x7e0 [ 2282.172605] __ext4_journal_start_sb+0x214/0x390 [ 2282.173063] ext4_dirty_inode+0xbc/0x130 [ 2282.173410] ? ext4_setattr+0x2160/0x2160 [ 2282.173810] __mark_inode_dirty+0x492/0xd40 [ 2282.174191] ? security_inode_need_killpriv+0x79/0xa0 [ 2282.174641] generic_update_time+0x21c/0x370 [ 2282.175104] file_update_time+0x43a/0x520 [ 2282.175453] ? evict_inodes+0x420/0x420 [ 2282.175913] ? down_write_killable+0x180/0x180 [ 2282.176308] file_modified+0x7d/0xa0 [ 2282.176624] ext4_file_write_iter+0x906/0x18d0 [ 2282.177212] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2282.177596] ? kasan_save_stack+0x32/0x40 [ 2282.177999] ? kasan_save_stack+0x1b/0x40 [ 2282.178361] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2282.178836] ? iter_file_splice_write+0x16d/0xc30 [ 2282.179242] ? direct_splice_actor+0x10f/0x170 [ 2282.179624] ? splice_direct_to_actor+0x387/0x980 [ 2282.180072] ? do_splice_direct+0x1c4/0x290 [ 2282.180438] ? do_sendfile+0x553/0x11e0 [ 2282.180848] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2282.181238] ? do_syscall_64+0x33/0x40 [ 2282.181566] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.182119] do_iter_readv_writev+0x476/0x750 [ 2282.182510] ? new_sync_write+0x660/0x660 [ 2282.182905] ? avc_policy_seqno+0x9/0x70 [ 2282.183248] ? selinux_file_permission+0x92/0x520 [ 2282.183656] ? security_file_permission+0xb1/0xe0 [ 2282.184112] do_iter_write+0x191/0x700 [ 2282.184444] ? trace_hardirqs_on+0x5b/0x180 [ 2282.184960] vfs_iter_write+0x70/0xa0 [ 2282.185291] iter_file_splice_write+0x762/0xc30 [ 2282.185728] ? generic_splice_sendpage+0x140/0x140 [ 2282.186263] ? trace_hardirqs_on+0x5b/0x180 [ 2282.186627] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2282.187213] ? generic_splice_sendpage+0x140/0x140 [ 2282.187625] direct_splice_actor+0x10f/0x170 [ 2282.188181] splice_direct_to_actor+0x387/0x980 [ 2282.188573] ? pipe_to_sendpage+0x380/0x380 [ 2282.189177] ? do_splice_to+0x160/0x160 [ 2282.189517] ? security_file_permission+0xb1/0xe0 [ 2282.190091] do_splice_direct+0x1c4/0x290 [ 2282.190450] ? splice_direct_to_actor+0x980/0x980 [ 2282.191032] ? avc_policy_seqno+0x9/0x70 [ 2282.191381] ? security_file_permission+0xb1/0xe0 [ 2282.191837] do_sendfile+0x553/0x11e0 [ 2282.192281] ? do_pwritev+0x270/0x270 [ 2282.192605] ? wait_for_completion_io+0x270/0x270 [ 2282.193208] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.193600] ? vfs_write+0x354/0xb10 [ 2282.194016] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.194418] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.194851] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.195334] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.195814] do_syscall_64+0x33/0x40 [ 2282.196198] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.196626] RIP: 0033:0x7f899d3cbb19 [ 2282.197083] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.198650] RSP: 002b:00007f899a920188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.199327] RAX: ffffffffffffffda RBX: 00007f899d4df020 RCX: 00007f899d3cbb19 [ 2282.199963] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000006 [ 2282.200552] RBP: 00007f899a9201d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.201190] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.201849] R13: 00007ffc2a56e11f R14: 00007f899a920300 R15: 0000000000022000 [ 2282.205256] FAULT_INJECTION: forcing a failure. [ 2282.205256] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.207478] CPU: 1 PID: 12028 Comm: syz-executor.5 Not tainted 5.10.224 #1 [ 2282.208916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.210918] Call Trace: [ 2282.211513] dump_stack+0x107/0x167 [ 2282.212418] should_fail.cold+0x5/0xa [ 2282.213331] ? iter_file_splice_write+0x16d/0xc30 [ 2282.213875] should_failslab+0x5/0x20 [ 2282.214504] __kmalloc+0x72/0x390 [ 2282.215353] iter_file_splice_write+0x16d/0xc30 [ 2282.216460] ? atime_needs_update+0x600/0x600 [ 2282.217554] ? generic_splice_sendpage+0x140/0x140 [ 2282.218776] ? pipe_to_user+0x170/0x170 [ 2282.219738] ? security_file_permission+0xb1/0xe0 [ 2282.220634] FAULT_INJECTION: forcing a failure. [ 2282.220634] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.220900] ? generic_splice_sendpage+0x140/0x140 [ 2282.220914] direct_splice_actor+0x10f/0x170 [ 2282.220931] splice_direct_to_actor+0x387/0x980 [ 2282.226408] ? pipe_to_sendpage+0x380/0x380 [ 2282.227470] ? do_splice_to+0x160/0x160 [ 2282.228413] ? security_file_permission+0xb1/0xe0 [ 2282.229567] do_splice_direct+0x1c4/0x290 [ 2282.230568] ? splice_direct_to_actor+0x980/0x980 [ 2282.231793] ? avc_policy_seqno+0x9/0x70 [ 2282.232782] ? security_file_permission+0xb1/0xe0 [ 2282.233943] do_sendfile+0x553/0x11e0 [ 2282.234887] ? do_pwritev+0x270/0x270 [ 2282.235810] ? wait_for_completion_io+0x270/0x270 [ 2282.236997] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.238119] ? vfs_write+0x354/0xb10 [ 2282.239020] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.240085] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.241209] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.242468] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.243729] do_syscall_64+0x33/0x40 [ 2282.244603] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.245891] RIP: 0033:0x7fb2ec3f9b19 [ 2282.246784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.251258] RSP: 002b:00007fb2e996f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.253108] RAX: ffffffffffffffda RBX: 00007fb2ec50cf60 RCX: 00007fb2ec3f9b19 [ 2282.254867] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2282.256540] RBP: 00007fb2e996f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.258259] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.260004] R13: 00007ffdb4f283cf R14: 00007fb2e996f300 R15: 0000000000022000 [ 2282.261687] CPU: 0 PID: 12034 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2282.262520] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.263447] Call Trace: [ 2282.263688] dump_stack+0x107/0x167 [ 2282.264125] should_fail.cold+0x5/0xa [ 2282.264477] ? create_object.isra.0+0x3a/0xa20 [ 2282.264864] should_failslab+0x5/0x20 [ 2282.265186] kmem_cache_alloc+0x5b/0x310 [ 2282.265530] create_object.isra.0+0x3a/0xa20 [ 2282.265912] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2282.266353] __kmalloc+0x16e/0x390 [ 2282.266658] alloc_pipe_info+0x1e5/0x590 [ 2282.267002] splice_direct_to_actor+0x774/0x980 [ 2282.267395] ? _cond_resched+0x12/0x80 [ 2282.267722] ? inode_security+0x107/0x140 [ 2282.268493] ? pipe_to_sendpage+0x380/0x380 [ 2282.268981] ? avc_policy_seqno+0x9/0x70 [ 2282.269478] ? selinux_file_permission+0x92/0x520 [ 2282.270035] ? do_splice_to+0x160/0x160 [ 2282.270536] ? security_file_permission+0xb1/0xe0 [ 2282.271120] do_splice_direct+0x1c4/0x290 [ 2282.271599] ? splice_direct_to_actor+0x980/0x980 [ 2282.272130] ? avc_policy_seqno+0x9/0x70 [ 2282.272604] ? security_file_permission+0xb1/0xe0 [ 2282.273191] do_sendfile+0x553/0x11e0 [ 2282.273654] ? do_pwritev+0x270/0x270 [ 2282.274099] ? wait_for_completion_io+0x270/0x270 [ 2282.274672] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.275253] ? vfs_write+0x354/0xb10 [ 2282.275683] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.276168] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.276605] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.277110] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.277626] do_syscall_64+0x33/0x40 [ 2282.277971] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.279096] RIP: 0033:0x7f9efa275b19 [ 2282.279954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.284203] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.285961] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2282.287607] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2282.289224] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.290860] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.292471] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 [ 2282.317531] FAULT_INJECTION: forcing a failure. [ 2282.317531] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.319143] CPU: 1 PID: 12037 Comm: syz-executor.7 Not tainted 5.10.224 #1 [ 2282.320035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.321103] Call Trace: [ 2282.321437] dump_stack+0x107/0x167 [ 2282.321953] should_fail.cold+0x5/0xa [ 2282.322364] ? create_object.isra.0+0x3a/0xa20 [ 2282.322852] should_failslab+0x5/0x20 [ 2282.323221] kmem_cache_alloc+0x5b/0x310 [ 2282.323610] create_object.isra.0+0x3a/0xa20 [ 2282.324082] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2282.324554] __kmalloc+0x16e/0x390 [ 2282.324982] alloc_pipe_info+0x1e5/0x590 [ 2282.325380] splice_direct_to_actor+0x774/0x980 [ 2282.325852] ? _cond_resched+0x12/0x80 [ 2282.326233] ? inode_security+0x107/0x140 [ 2282.326641] ? pipe_to_sendpage+0x380/0x380 [ 2282.327113] ? avc_policy_seqno+0x9/0x70 [ 2282.327504] ? selinux_file_permission+0x92/0x520 23:32:20 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 2282.328020] ? do_splice_to+0x160/0x160 [ 2282.328592] ? security_file_permission+0xb1/0xe0 [ 2282.329135] do_splice_direct+0x1c4/0x290 [ 2282.329527] ? splice_direct_to_actor+0x980/0x980 [ 2282.330023] ? avc_policy_seqno+0x9/0x70 [ 2282.330423] ? security_file_permission+0xb1/0xe0 [ 2282.330929] do_sendfile+0x553/0x11e0 [ 2282.331299] ? do_pwritev+0x270/0x270 [ 2282.331660] ? wait_for_completion_io+0x270/0x270 [ 2282.332163] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.332598] ? vfs_write+0x354/0xb10 [ 2282.333028] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.333465] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.333953] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.334464] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.334992] do_syscall_64+0x33/0x40 [ 2282.335348] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.335890] RIP: 0033:0x7f0361883b19 [ 2282.336244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.338071] RSP: 002b:00007f035edf9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.338913] RAX: ffffffffffffffda RBX: 00007f0361996f60 RCX: 00007f0361883b19 [ 2282.339572] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2282.340292] RBP: 00007f035edf91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.341027] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.341727] R13: 00007fffbfc0e05f R14: 00007f035edf9300 R15: 0000000000022000 23:32:20 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 7) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:32:20 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 5) 23:32:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 6) 23:32:20 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 6) [ 2282.458624] FAULT_INJECTION: forcing a failure. [ 2282.458624] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.459759] CPU: 1 PID: 12052 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 2282.460341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.461075] Call Trace: [ 2282.461305] dump_stack+0x107/0x167 [ 2282.461615] should_fail.cold+0x5/0xa [ 2282.461990] ? create_object.isra.0+0x3a/0xa20 [ 2282.462398] should_failslab+0x5/0x20 [ 2282.462797] kmem_cache_alloc+0x5b/0x310 [ 2282.463142] ? igrab+0xc0/0xc0 [ 2282.463416] create_object.isra.0+0x3a/0xa20 [ 2282.463834] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2282.464267] __kmalloc+0x16e/0x390 [ 2282.464574] iter_file_splice_write+0x16d/0xc30 [ 2282.465021] ? atime_needs_update+0x600/0x600 [ 2282.465408] ? generic_splice_sendpage+0x140/0x140 [ 2282.465865] ? pipe_to_user+0x170/0x170 [ 2282.466238] ? security_file_permission+0xb1/0xe0 [ 2282.466645] ? generic_splice_sendpage+0x140/0x140 [ 2282.467126] direct_splice_actor+0x10f/0x170 [ 2282.467501] splice_direct_to_actor+0x387/0x980 [ 2282.467944] ? pipe_to_sendpage+0x380/0x380 [ 2282.468953] ? do_splice_to+0x160/0x160 [ 2282.470177] ? security_file_permission+0xb1/0xe0 [ 2282.470591] do_splice_direct+0x1c4/0x290 [ 2282.471013] ? splice_direct_to_actor+0x980/0x980 [ 2282.471432] ? avc_policy_seqno+0x9/0x70 [ 2282.471833] ? security_file_permission+0xb1/0xe0 [ 2282.472250] do_sendfile+0x553/0x11e0 [ 2282.472578] ? do_pwritev+0x270/0x270 [ 2282.472962] ? wait_for_completion_io+0x270/0x270 [ 2282.473376] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.473871] ? vfs_write+0x354/0xb10 [ 2282.474204] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.474602] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.475063] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.475512] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.475992] do_syscall_64+0x33/0x40 [ 2282.476309] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.476792] RIP: 0033:0x7fda184cab19 [ 2282.477107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.478820] RSP: 002b:00007fda15a40188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.479457] RAX: ffffffffffffffda RBX: 00007fda185ddf60 RCX: 00007fda184cab19 [ 2282.480124] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2282.480765] RBP: 00007fda15a401d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.481361] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.482008] R13: 00007ffc0f97e54f R14: 00007fda15a40300 R15: 0000000000022000 23:32:20 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 5) [ 2282.496420] FAULT_INJECTION: forcing a failure. [ 2282.496420] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.497499] CPU: 1 PID: 12056 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2282.498132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.498875] Call Trace: [ 2282.499102] dump_stack+0x107/0x167 [ 2282.499411] should_fail.cold+0x5/0xa [ 2282.499784] ? create_object.isra.0+0x3a/0xa20 [ 2282.500174] should_failslab+0x5/0x20 [ 2282.500498] kmem_cache_alloc+0x5b/0x310 [ 2282.500917] ? selinux_determine_inode_label+0x1ab/0x340 [ 2282.501376] create_object.isra.0+0x3a/0xa20 [ 2282.501799] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2282.502243] __kmalloc+0x16e/0x390 [ 2282.502555] cgroup_mkdir+0x254/0xf50 [ 2282.502955] ? cgroup_destroy_locked+0x710/0x710 [ 2282.503363] kernfs_iop_mkdir+0x14d/0x1e0 [ 2282.503761] vfs_mkdir+0x493/0x750 [ 2282.504071] do_mkdirat+0x150/0x2b0 [ 2282.504380] ? user_path_create+0xf0/0xf0 [ 2282.504804] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.505249] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.505683] do_syscall_64+0x33/0x40 [ 2282.506050] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.506489] RIP: 0033:0x7f0c1cebab19 [ 2282.506854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.508426] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2282.509131] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2282.509775] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2282.510482] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.511130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2282.511772] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 23:32:21 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:32:21 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 5) [ 2282.548124] cgroup: Unknown subsys name 'perf_event' [ 2282.557208] FAULT_INJECTION: forcing a failure. [ 2282.557208] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.559875] CPU: 0 PID: 12058 Comm: syz-executor.2 Not tainted 5.10.224 #1 [ 2282.561398] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.563205] Call Trace: [ 2282.563663] dump_stack+0x107/0x167 [ 2282.564303] should_fail.cold+0x5/0xa [ 2282.564962] ? iter_file_splice_write+0x16d/0xc30 [ 2282.565538] should_failslab+0x5/0x20 [ 2282.565874] __kmalloc+0x72/0x390 [ 2282.566182] iter_file_splice_write+0x16d/0xc30 [ 2282.566994] ? atime_needs_update+0x600/0x600 [ 2282.567987] ? generic_splice_sendpage+0x140/0x140 [ 2282.569071] ? pipe_to_user+0x170/0x170 [ 2282.569963] ? security_file_permission+0xb1/0xe0 [ 2282.571033] ? generic_splice_sendpage+0x140/0x140 [ 2282.572108] direct_splice_actor+0x10f/0x170 [ 2282.573075] splice_direct_to_actor+0x387/0x980 [ 2282.574108] ? pipe_to_sendpage+0x380/0x380 [ 2282.575057] ? do_splice_to+0x160/0x160 [ 2282.575916] ? security_file_permission+0xb1/0xe0 [ 2282.576751] do_splice_direct+0x1c4/0x290 [ 2282.577193] ? splice_direct_to_actor+0x980/0x980 [ 2282.577611] ? avc_policy_seqno+0x9/0x70 [ 2282.577973] ? security_file_permission+0xb1/0xe0 [ 2282.579074] do_sendfile+0x553/0x11e0 [ 2282.579916] ? do_pwritev+0x270/0x270 [ 2282.580760] ? wait_for_completion_io+0x270/0x270 [ 2282.581826] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.582853] ? vfs_write+0x354/0xb10 [ 2282.583676] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.584711] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.585731] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.586888] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.588016] do_syscall_64+0x33/0x40 [ 2282.588844] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.589964] RIP: 0033:0x7ff7be6abb19 [ 2282.590787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.594348] RSP: 002b:00007ff7bbc21188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.595139] RAX: ffffffffffffffda RBX: 00007ff7be7bef60 RCX: 00007ff7be6abb19 [ 2282.596250] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2282.596852] RBP: 00007ff7bbc211d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.597461] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.598071] R13: 00007fff3e2a8ebf R14: 00007ff7bbc21300 R15: 0000000000022000 [ 2282.622586] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2282.631488] FAULT_INJECTION: forcing a failure. [ 2282.631488] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.632572] CPU: 1 PID: 12063 Comm: syz-executor.5 Not tainted 5.10.224 #1 [ 2282.633235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.634000] Call Trace: [ 2282.634295] dump_stack+0x107/0x167 [ 2282.634671] should_fail.cold+0x5/0xa [ 2282.635058] ? create_object.isra.0+0x3a/0xa20 [ 2282.635468] should_failslab+0x5/0x20 [ 2282.635887] kmem_cache_alloc+0x5b/0x310 [ 2282.636252] create_object.isra.0+0x3a/0xa20 [ 2282.636644] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2282.637137] __kmalloc+0x16e/0x390 [ 2282.637458] iter_file_splice_write+0x16d/0xc30 [ 2282.637912] ? atime_needs_update+0x600/0x600 [ 2282.638328] ? generic_splice_sendpage+0x140/0x140 [ 2282.638791] ? pipe_to_user+0x170/0x170 [ 2282.639149] ? security_file_permission+0xb1/0xe0 [ 2282.639556] ? generic_splice_sendpage+0x140/0x140 [ 2282.640038] direct_splice_actor+0x10f/0x170 [ 2282.640412] splice_direct_to_actor+0x387/0x980 [ 2282.640858] ? pipe_to_sendpage+0x380/0x380 [ 2282.641224] ? do_splice_to+0x160/0x160 [ 2282.641561] ? security_file_permission+0xb1/0xe0 [ 2282.642025] do_splice_direct+0x1c4/0x290 [ 2282.642386] ? splice_direct_to_actor+0x980/0x980 [ 2282.642838] ? avc_policy_seqno+0x9/0x70 [ 2282.643189] ? security_file_permission+0xb1/0xe0 [ 2282.643601] do_sendfile+0x553/0x11e0 [ 2282.644004] ? do_pwritev+0x270/0x270 [ 2282.644336] ? wait_for_completion_io+0x270/0x270 [ 2282.644797] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.645189] ? vfs_write+0x354/0xb10 [ 2282.645509] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.645946] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.646356] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.646844] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.647278] do_syscall_64+0x33/0x40 [ 2282.647593] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.648065] RIP: 0033:0x7fb2ec3f9b19 [ 2282.648379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.650002] RSP: 002b:00007fb2e996f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.650653] RAX: ffffffffffffffda RBX: 00007fb2ec50cf60 RCX: 00007fb2ec3f9b19 [ 2282.651292] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2282.651931] RBP: 00007fb2e996f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.652523] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.653158] R13: 00007ffdb4f283cf R14: 00007fb2e996f300 R15: 0000000000022000 23:32:21 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:32:21 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 6) [ 2282.737133] FAULT_INJECTION: forcing a failure. [ 2282.737133] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.738365] CPU: 1 PID: 12068 Comm: syz-executor.7 Not tainted 5.10.224 #1 [ 2282.739123] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.740020] Call Trace: [ 2282.740299] dump_stack+0x107/0x167 [ 2282.740678] should_fail.cold+0x5/0xa [ 2282.741132] ? iter_file_splice_write+0x16d/0xc30 [ 2282.741634] should_failslab+0x5/0x20 [ 2282.742091] __kmalloc+0x72/0x390 [ 2282.742436] iter_file_splice_write+0x16d/0xc30 [ 2282.742984] ? atime_needs_update+0x600/0x600 [ 2282.743455] ? generic_splice_sendpage+0x140/0x140 [ 2282.744013] ? pipe_to_user+0x170/0x170 [ 2282.744444] ? security_file_permission+0xb1/0xe0 [ 2282.744992] ? generic_splice_sendpage+0x140/0x140 [ 2282.745502] direct_splice_actor+0x10f/0x170 [ 2282.746015] splice_direct_to_actor+0x387/0x980 [ 2282.746471] ? pipe_to_sendpage+0x380/0x380 [ 2282.746967] ? do_splice_to+0x160/0x160 [ 2282.747384] ? security_file_permission+0xb1/0xe0 [ 2282.748004] do_splice_direct+0x1c4/0x290 [ 2282.748493] ? splice_direct_to_actor+0x980/0x980 [ 2282.749042] ? avc_policy_seqno+0x9/0x70 [ 2282.749471] ? security_file_permission+0xb1/0xe0 [ 2282.750032] do_sendfile+0x553/0x11e0 [ 2282.750381] ? do_pwritev+0x270/0x270 [ 2282.750781] ? wait_for_completion_io+0x270/0x270 [ 2282.751198] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.751590] ? vfs_write+0x354/0xb10 [ 2282.751954] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.752336] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.752771] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.753218] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.753651] do_syscall_64+0x33/0x40 [ 2282.754011] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.754549] RIP: 0033:0x7f0361883b19 [ 2282.754996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.756971] RSP: 002b:00007f035edf9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.757793] RAX: ffffffffffffffda RBX: 00007f0361996f60 RCX: 00007f0361883b19 [ 2282.758501] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000007 [ 2282.759413] RBP: 00007f035edf91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.760363] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.761166] R13: 00007fffbfc0e05f R14: 00007f035edf9300 R15: 0000000000022000 [ 2282.788853] FAULT_INJECTION: forcing a failure. [ 2282.788853] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.790091] CPU: 1 PID: 12072 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2282.790793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.791651] Call Trace: [ 2282.791989] dump_stack+0x107/0x167 [ 2282.792358] should_fail.cold+0x5/0xa [ 2282.792793] ? iter_file_splice_write+0x16d/0xc30 [ 2282.793286] should_failslab+0x5/0x20 [ 2282.793670] __kmalloc+0x72/0x390 [ 2282.794083] iter_file_splice_write+0x16d/0xc30 [ 2282.794535] ? atime_needs_update+0x600/0x600 [ 2282.795052] ? generic_splice_sendpage+0x140/0x140 [ 2282.795547] ? pipe_to_user+0x170/0x170 [ 2282.796049] ? security_file_permission+0xb1/0xe0 [ 2282.796542] ? generic_splice_sendpage+0x140/0x140 [ 2282.797092] direct_splice_actor+0x10f/0x170 [ 2282.797520] splice_direct_to_actor+0x387/0x980 [ 2282.798008] ? pipe_to_sendpage+0x380/0x380 [ 2282.798440] ? do_splice_to+0x160/0x160 [ 2282.798878] ? security_file_permission+0xb1/0xe0 [ 2282.799363] do_splice_direct+0x1c4/0x290 [ 2282.799836] ? splice_direct_to_actor+0x980/0x980 [ 2282.800292] ? avc_policy_seqno+0x9/0x70 [ 2282.800681] ? security_file_permission+0xb1/0xe0 [ 2282.801199] do_sendfile+0x553/0x11e0 [ 2282.801567] ? do_pwritev+0x270/0x270 [ 2282.801992] ? wait_for_completion_io+0x270/0x270 [ 2282.802475] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.803530] ? vfs_write+0x354/0xb10 [ 2282.803985] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.804444] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.804961] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.805501] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.806060] do_syscall_64+0x33/0x40 [ 2282.806456] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.807029] RIP: 0033:0x7f9efa275b19 [ 2282.807421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.809307] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.810022] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2282.810624] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2282.811269] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.811911] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.812508] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 23:32:21 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 8) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:32:21 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 2282.859407] FAULT_INJECTION: forcing a failure. [ 2282.859407] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.861348] CPU: 1 PID: 12079 Comm: syz-executor.2 Not tainted 5.10.224 #1 [ 2282.862075] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.862941] Call Trace: [ 2282.863219] dump_stack+0x107/0x167 [ 2282.863593] should_fail.cold+0x5/0xa [ 2282.864052] ? create_object.isra.0+0x3a/0xa20 [ 2282.864521] should_failslab+0x5/0x20 [ 2282.865020] kmem_cache_alloc+0x5b/0x310 [ 2282.865427] ? igrab+0xc0/0xc0 [ 2282.865852] create_object.isra.0+0x3a/0xa20 [ 2282.866304] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2282.866871] __kmalloc+0x16e/0x390 [ 2282.867247] iter_file_splice_write+0x16d/0xc30 [ 2282.867737] ? atime_needs_update+0x600/0x600 [ 2282.868206] ? generic_splice_sendpage+0x140/0x140 [ 2282.868763] ? pipe_to_user+0x170/0x170 [ 2282.869199] ? security_file_permission+0xb1/0xe0 [ 2282.869728] ? generic_splice_sendpage+0x140/0x140 [ 2282.870245] direct_splice_actor+0x10f/0x170 [ 2282.870736] splice_direct_to_actor+0x387/0x980 [ 2282.871219] ? pipe_to_sendpage+0x380/0x380 [ 2282.871657] ? do_splice_to+0x160/0x160 [ 2282.872117] ? security_file_permission+0xb1/0xe0 [ 2282.872617] do_splice_direct+0x1c4/0x290 [ 2282.873108] ? splice_direct_to_actor+0x980/0x980 [ 2282.873601] ? avc_policy_seqno+0x9/0x70 [ 2282.874085] ? security_file_permission+0xb1/0xe0 [ 2282.874587] do_sendfile+0x553/0x11e0 [ 2282.874965] ? do_pwritev+0x270/0x270 [ 2282.875295] ? wait_for_completion_io+0x270/0x270 [ 2282.875744] ? rcu_read_lock_any_held+0x75/0xa0 [ 2282.876144] ? vfs_write+0x354/0xb10 [ 2282.876463] __x64_sys_sendfile64+0x1d1/0x210 [ 2282.876922] ? __ia32_sys_sendfile+0x220/0x220 [ 2282.877314] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.878411] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.879878] do_syscall_64+0x33/0x40 [ 2282.880199] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.880636] RIP: 0033:0x7ff7be6abb19 [ 2282.881027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.882609] RSP: 002b:00007ff7bbc21188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2282.883288] RAX: ffffffffffffffda RBX: 00007ff7be7bef60 RCX: 00007ff7be6abb19 [ 2282.883982] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2282.884576] RBP: 00007ff7bbc211d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.886968] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2282.887682] R13: 00007fff3e2a8ebf R14: 00007ff7bbc21300 R15: 0000000000022000 23:32:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 2282.931470] FAULT_INJECTION: forcing a failure. [ 2282.931470] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.932826] CPU: 1 PID: 12082 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2282.933479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.934345] Call Trace: [ 2282.934606] dump_stack+0x107/0x167 [ 2282.935047] should_fail.cold+0x5/0xa [ 2282.935426] ? create_object.isra.0+0x3a/0xa20 [ 2282.935933] should_failslab+0x5/0x20 [ 2282.936312] kmem_cache_alloc+0x5b/0x310 [ 2282.936749] create_object.isra.0+0x3a/0xa20 [ 2282.937200] kmemleak_alloc_percpu+0xa0/0x100 [ 2282.937635] pcpu_alloc+0x4e2/0x1240 [ 2282.938056] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 2282.938527] percpu_ref_init+0x31/0x3d0 [ 2282.939599] cgroup_mkdir+0x28b/0xf50 [ 2282.940054] ? cgroup_destroy_locked+0x710/0x710 [ 2282.940538] kernfs_iop_mkdir+0x14d/0x1e0 [ 2282.941022] vfs_mkdir+0x493/0x750 [ 2282.941382] do_mkdirat+0x150/0x2b0 [ 2282.941814] ? user_path_create+0xf0/0xf0 [ 2282.942261] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2282.942861] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2282.943386] do_syscall_64+0x33/0x40 [ 2282.943850] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2282.944364] RIP: 0033:0x7f0c1cebab19 [ 2282.944798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.946639] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2282.947357] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2282.948019] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2282.948612] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.949264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2282.949909] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2282.984402] cgroup: Unknown subsys name 'perf_event' [ 2282.993317] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:32:34 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 7) 23:32:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:32:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000002) 23:32:34 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:32:34 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 6) 23:32:34 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 6) 23:32:34 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 7) 23:32:34 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 9) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2296.213506] FAULT_INJECTION: forcing a failure. [ 2296.213506] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.216371] CPU: 1 PID: 12106 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2296.218127] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2296.220164] Call Trace: [ 2296.220849] dump_stack+0x107/0x167 [ 2296.221742] should_fail.cold+0x5/0xa [ 2296.222647] ? create_object.isra.0+0x3a/0xa20 [ 2296.224610] should_failslab+0x5/0x20 [ 2296.225548] kmem_cache_alloc+0x5b/0x310 [ 2296.226552] ? mark_held_locks+0x9e/0xe0 [ 2296.227564] create_object.isra.0+0x3a/0xa20 [ 2296.228637] kmemleak_alloc_percpu+0xa0/0x100 [ 2296.229766] pcpu_alloc+0x4e2/0x1240 [ 2296.230649] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 2296.231870] percpu_ref_init+0x31/0x3d0 [ 2296.232838] cgroup_mkdir+0x28b/0xf50 [ 2296.233745] ? cgroup_destroy_locked+0x710/0x710 [ 2296.234957] kernfs_iop_mkdir+0x14d/0x1e0 [ 2296.235959] vfs_mkdir+0x493/0x750 [ 2296.236824] do_mkdirat+0x150/0x2b0 [ 2296.237643] ? user_path_create+0xf0/0xf0 [ 2296.238659] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2296.239974] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2296.241199] do_syscall_64+0x33/0x40 [ 2296.242107] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2296.243378] RIP: 0033:0x7f0c1cebab19 [ 2296.244281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2296.248772] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2296.250559] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2296.252308] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2296.254039] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2296.255794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2296.257467] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2296.266314] cgroup: Unknown subsys name 'perf_event' [ 2296.282085] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2296.283529] FAULT_INJECTION: forcing a failure. [ 2296.283529] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2296.286038] CPU: 0 PID: 12124 Comm: syz-executor.5 Not tainted 5.10.224 #1 [ 2296.287240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2296.289361] Call Trace: [ 2296.290058] dump_stack+0x107/0x167 [ 2296.291035] should_fail.cold+0x5/0xa [ 2296.292007] __alloc_pages_nodemask+0x182/0x600 [ 2296.293180] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2296.294680] ? find_get_entry+0x2c8/0x740 [ 2296.296730] alloc_pages_current+0x187/0x280 [ 2296.297836] __page_cache_alloc+0x2d2/0x360 [ 2296.299035] pagecache_get_page+0x2c7/0xc80 [ 2296.300135] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2296.301443] grab_cache_page_write_begin+0x64/0xa0 [ 2296.302698] cont_write_begin+0x448/0x980 [ 2296.303794] ? fat_add_cluster+0x100/0x100 [ 2296.304907] ? nobh_write_begin+0xed0/0xed0 [ 2296.306024] ? __mark_inode_dirty+0x93b/0xd40 [ 2296.307190] FAULT_INJECTION: forcing a failure. [ 2296.307190] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.310002] ? lock_downgrade+0x6d0/0x6d0 [ 2296.311096] ? do_raw_spin_lock+0x121/0x260 [ 2296.312208] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2296.313473] ? rwlock_bug.part.0+0x90/0x90 [ 2296.314551] fat_write_begin+0x89/0x180 [ 2296.315575] ? fat_add_cluster+0x100/0x100 [ 2296.316681] generic_perform_write+0x20a/0x4f0 [ 2296.317830] ? fat_direct_IO+0x1ef/0x380 [ 2296.318857] ? page_cache_prev_miss+0x310/0x310 [ 2296.320120] __generic_file_write_iter+0x2cd/0x5d0 [ 2296.321346] generic_file_write_iter+0xdb/0x230 [ 2296.322542] do_iter_readv_writev+0x476/0x750 [ 2296.323704] ? new_sync_write+0x660/0x660 [ 2296.324755] ? avc_policy_seqno+0x9/0x70 [ 2296.325780] ? selinux_file_permission+0x92/0x520 [ 2296.327103] ? security_file_permission+0xb1/0xe0 [ 2296.328312] do_iter_write+0x191/0x700 [ 2296.329295] ? trace_hardirqs_on+0x5b/0x180 [ 2296.330389] vfs_iter_write+0x70/0xa0 [ 2296.331383] iter_file_splice_write+0x762/0xc30 [ 2296.332562] ? generic_splice_sendpage+0x140/0x140 [ 2296.333789] ? security_file_permission+0xb1/0xe0 [ 2296.335097] ? generic_splice_sendpage+0x140/0x140 [ 2296.336326] direct_splice_actor+0x10f/0x170 [ 2296.337442] splice_direct_to_actor+0x387/0x980 [ 2296.338635] ? pipe_to_sendpage+0x380/0x380 [ 2296.339761] ? do_splice_to+0x160/0x160 [ 2296.340763] ? security_file_permission+0xb1/0xe0 [ 2296.342038] do_splice_direct+0x1c4/0x290 [ 2296.343121] ? splice_direct_to_actor+0x980/0x980 [ 2296.344326] ? avc_policy_seqno+0x9/0x70 [ 2296.345362] ? security_file_permission+0xb1/0xe0 [ 2296.346584] do_sendfile+0x553/0x11e0 [ 2296.347580] ? do_pwritev+0x270/0x270 [ 2296.348562] ? wait_for_completion_io+0x270/0x270 [ 2296.349760] ? rcu_read_lock_any_held+0x75/0xa0 [ 2296.351003] ? vfs_write+0x354/0xb10 [ 2296.351973] __x64_sys_sendfile64+0x1d1/0x210 [ 2296.353123] ? __ia32_sys_sendfile+0x220/0x220 [ 2296.354287] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2296.355609] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2296.356947] do_syscall_64+0x33/0x40 [ 2296.357840] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2296.359213] RIP: 0033:0x7fb2ec3f9b19 [ 2296.360175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2296.364832] RSP: 002b:00007fb2e994e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2296.366763] RAX: ffffffffffffffda RBX: 00007fb2ec50d020 RCX: 00007fb2ec3f9b19 [ 2296.368615] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000006 [ 2296.370448] RBP: 00007fb2e994e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2296.372292] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2296.374123] R13: 00007ffdb4f283cf R14: 00007fb2e994e300 R15: 0000000000022000 [ 2296.375939] CPU: 1 PID: 12125 Comm: syz-executor.7 Not tainted 5.10.224 #1 [ 2296.377242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2296.379200] Call Trace: [ 2296.379790] dump_stack+0x107/0x167 [ 2296.380158] should_fail.cold+0x5/0xa [ 2296.380530] ? create_object.isra.0+0x3a/0xa20 [ 2296.380974] should_failslab+0x5/0x20 [ 2296.381347] kmem_cache_alloc+0x5b/0x310 [ 2296.381756] create_object.isra.0+0x3a/0xa20 [ 2296.382196] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2296.383133] __kmalloc+0x16e/0x390 [ 2296.383505] alloc_pipe_info+0x1e5/0x590 [ 2296.383918] splice_direct_to_actor+0x774/0x980 [ 2296.384387] ? _cond_resched+0x12/0x80 [ 2296.385260] ? inode_security+0x107/0x140 [ 2296.385667] ? pipe_to_sendpage+0x380/0x380 [ 2296.386695] ? avc_policy_seqno+0x9/0x70 [ 2296.387110] ? selinux_file_permission+0x92/0x520 [ 2296.387597] ? do_splice_to+0x160/0x160 [ 2296.388003] ? security_file_permission+0xb1/0xe0 [ 2296.388485] do_splice_direct+0x1c4/0x290 [ 2296.388906] ? splice_direct_to_actor+0x980/0x980 [ 2296.389387] ? avc_policy_seqno+0x9/0x70 [ 2296.390331] ? security_file_permission+0xb1/0xe0 [ 2296.390838] do_sendfile+0x553/0x11e0 [ 2296.391234] ? do_pwritev+0x270/0x270 [ 2296.391639] ? wait_for_completion_io+0x270/0x270 [ 2296.392118] ? rcu_read_lock_any_held+0x75/0xa0 [ 2296.392598] ? vfs_write+0x354/0xb10 [ 2296.392973] __x64_sys_sendfile64+0x1d1/0x210 [ 2296.393982] ? __ia32_sys_sendfile+0x220/0x220 [ 2296.394479] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2296.394980] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2296.396137] do_syscall_64+0x33/0x40 [ 2296.396488] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2296.396983] RIP: 0033:0x7f0361883b19 [ 2296.397340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2296.400124] RSP: 002b:00007f035edd8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2296.400888] RAX: ffffffffffffffda RBX: 00007f0361997020 RCX: 00007f0361883b19 [ 2296.401582] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 2296.402296] RBP: 00007f035edd81d0 R08: 0000000000000000 R09: 0000000000000000 [ 2296.402997] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2296.403696] R13: 00007fffbfc0e05f R14: 00007f035edd8300 R15: 0000000000022000 [ 2296.408537] FAULT_INJECTION: forcing a failure. [ 2296.408537] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.410195] FAULT_INJECTION: forcing a failure. [ 2296.410195] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.412352] CPU: 1 PID: 12126 Comm: syz-executor.2 Not tainted 5.10.224 #1 [ 2296.413042] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2296.415036] Call Trace: [ 2296.415637] dump_stack+0x107/0x167 [ 2296.416476] should_fail.cold+0x5/0xa [ 2296.417349] ? jbd2__journal_start+0x190/0x7e0 [ 2296.418442] should_failslab+0x5/0x20 [ 2296.419320] kmem_cache_alloc+0x5b/0x310 [ 2296.420256] jbd2__journal_start+0x190/0x7e0 [ 2296.421274] __ext4_journal_start_sb+0x214/0x390 [ 2296.422427] ext4_dirty_inode+0xbc/0x130 [ 2296.423367] ? ext4_setattr+0x2160/0x2160 [ 2296.424310] __mark_inode_dirty+0x492/0xd40 [ 2296.425311] ? security_inode_need_killpriv+0x79/0xa0 [ 2296.426532] generic_update_time+0x21c/0x370 [ 2296.427550] file_update_time+0x43a/0x520 [ 2296.428500] ? evict_inodes+0x420/0x420 [ 2296.429415] ? down_write_killable+0x180/0x180 [ 2296.430498] file_modified+0x7d/0xa0 [ 2296.430886] ext4_file_write_iter+0x906/0x18d0 [ 2296.431935] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2296.432407] ? kasan_save_stack+0x32/0x40 [ 2296.432825] ? kasan_save_stack+0x1b/0x40 [ 2296.433251] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2296.433756] ? iter_file_splice_write+0x16d/0xc30 [ 2296.434246] ? direct_splice_actor+0x10f/0x170 [ 2296.435329] ? splice_direct_to_actor+0x387/0x980 [ 2296.435818] ? do_splice_direct+0x1c4/0x290 [ 2296.436268] ? do_sendfile+0x553/0x11e0 [ 2296.436686] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2296.437166] ? do_syscall_64+0x33/0x40 [ 2296.438051] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2296.438625] do_iter_readv_writev+0x476/0x750 [ 2296.439082] ? new_sync_write+0x660/0x660 [ 2296.439503] ? avc_policy_seqno+0x9/0x70 [ 2296.439917] ? selinux_file_permission+0x92/0x520 [ 2296.440415] ? security_file_permission+0xb1/0xe0 [ 2296.440900] do_iter_write+0x191/0x700 [ 2296.441307] ? trace_hardirqs_on+0x5b/0x180 [ 2296.441754] vfs_iter_write+0x70/0xa0 [ 2296.442143] iter_file_splice_write+0x762/0xc30 [ 2296.442659] ? generic_splice_sendpage+0x140/0x140 [ 2296.443187] ? security_file_permission+0xb1/0xe0 [ 2296.443669] ? generic_splice_sendpage+0x140/0x140 [ 2296.444160] direct_splice_actor+0x10f/0x170 [ 2296.444612] splice_direct_to_actor+0x387/0x980 [ 2296.445079] ? pipe_to_sendpage+0x380/0x380 [ 2296.445509] ? do_splice_to+0x160/0x160 [ 2296.445912] ? security_file_permission+0xb1/0xe0 [ 2296.446382] do_splice_direct+0x1c4/0x290 [ 2296.446733] ? splice_direct_to_actor+0x980/0x980 [ 2296.447139] ? avc_policy_seqno+0x9/0x70 [ 2296.447488] ? security_file_permission+0xb1/0xe0 [ 2296.447898] do_sendfile+0x553/0x11e0 [ 2296.448228] ? do_pwritev+0x270/0x270 [ 2296.448552] ? wait_for_completion_io+0x270/0x270 [ 2296.448958] ? rcu_read_lock_any_held+0x75/0xa0 [ 2296.449347] ? vfs_write+0x354/0xb10 [ 2296.449667] __x64_sys_sendfile64+0x1d1/0x210 [ 2296.450048] ? __ia32_sys_sendfile+0x220/0x220 [ 2296.450797] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2296.451722] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2296.452615] do_syscall_64+0x33/0x40 [ 2296.453250] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2296.454132] RIP: 0033:0x7ff7be6abb19 [ 2296.454976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2296.458221] RSP: 002b:00007ff7bbc00188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2296.459979] RAX: ffffffffffffffda RBX: 00007ff7be7bf020 RCX: 00007ff7be6abb19 [ 2296.461199] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000006 [ 2296.462480] RBP: 00007ff7bbc001d0 R08: 0000000000000000 R09: 0000000000000000 [ 2296.463726] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2296.464950] R13: 00007fff3e2a8ebf R14: 00007ff7bbc00300 R15: 0000000000022000 [ 2296.466188] CPU: 0 PID: 12111 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2296.467745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2296.469350] Call Trace: [ 2296.469803] dump_stack+0x107/0x167 [ 2296.470498] should_fail.cold+0x5/0xa [ 2296.471151] ? create_object.isra.0+0x3a/0xa20 [ 2296.471935] should_failslab+0x5/0x20 [ 2296.472597] kmem_cache_alloc+0x5b/0x310 [ 2296.473295] create_object.isra.0+0x3a/0xa20 [ 2296.474061] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2296.475175] __kmalloc+0x16e/0x390 [ 2296.475788] alloc_pipe_info+0x1e5/0x590 [ 2296.476477] splice_direct_to_actor+0x774/0x980 [ 2296.477337] ? _cond_resched+0x12/0x80 [ 2296.477997] ? inode_security+0x107/0x140 [ 2296.478868] ? pipe_to_sendpage+0x380/0x380 [ 2296.479613] ? avc_policy_seqno+0x9/0x70 [ 2296.480314] ? selinux_file_permission+0x92/0x520 [ 2296.481151] ? do_splice_to+0x160/0x160 [ 2296.481843] ? security_file_permission+0xb1/0xe0 [ 2296.482830] do_splice_direct+0x1c4/0x290 [ 2296.483536] ? splice_direct_to_actor+0x980/0x980 [ 2296.484368] ? avc_policy_seqno+0x9/0x70 [ 2296.485070] ? security_file_permission+0xb1/0xe0 [ 2296.485897] do_sendfile+0x553/0x11e0 [ 2296.486690] ? do_pwritev+0x270/0x270 [ 2296.487355] ? wait_for_completion_io+0x270/0x270 [ 2296.488192] ? rcu_read_lock_any_held+0x75/0xa0 [ 2296.488993] ? vfs_write+0x354/0xb10 [ 2296.489641] __x64_sys_sendfile64+0x1d1/0x210 [ 2296.490372] ? __ia32_sys_sendfile+0x220/0x220 [ 2296.490769] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2296.491216] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2296.491660] do_syscall_64+0x33/0x40 [ 2296.491982] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2296.492421] RIP: 0033:0x7f9efa275b19 [ 2296.492743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2296.494373] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2296.495021] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2296.495616] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2296.496212] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2296.496817] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2296.497419] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 23:32:35 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:32:35 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) (fail_nth: 8) [ 2296.633546] FAULT_INJECTION: forcing a failure. [ 2296.633546] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.636089] CPU: 0 PID: 12131 Comm: syz-executor.5 Not tainted 5.10.224 #1 [ 2296.637354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2296.639095] Call Trace: [ 2296.639573] dump_stack+0x107/0x167 [ 2296.640232] should_fail.cold+0x5/0xa [ 2296.640925] ? create_object.isra.0+0x3a/0xa20 [ 2296.641753] should_failslab+0x5/0x20 [ 2296.642379] kmem_cache_alloc+0x5b/0x310 [ 2296.642728] create_object.isra.0+0x3a/0xa20 [ 2296.643098] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2296.643530] kmem_cache_alloc+0x159/0x310 [ 2296.643888] jbd2__journal_start+0x190/0x7e0 [ 2296.644271] __ext4_journal_start_sb+0x214/0x390 [ 2296.644679] ext4_dirty_inode+0xbc/0x130 [ 2296.645030] ? ext4_setattr+0x2160/0x2160 [ 2296.645380] __mark_inode_dirty+0x492/0xd40 [ 2296.645753] ? security_inode_need_killpriv+0x79/0xa0 [ 2296.646190] generic_update_time+0x21c/0x370 [ 2296.646620] file_update_time+0x43a/0x520 [ 2296.646969] ? evict_inodes+0x420/0x420 [ 2296.647311] ? down_write_killable+0x180/0x180 [ 2296.647695] file_modified+0x7d/0xa0 [ 2296.648009] ext4_file_write_iter+0x906/0x18d0 [ 2296.648401] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2296.648782] ? kasan_save_stack+0x32/0x40 [ 2296.649129] ? kasan_save_stack+0x1b/0x40 [ 2296.649478] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2296.649902] ? iter_file_splice_write+0x16d/0xc30 [ 2296.650354] ? direct_splice_actor+0x10f/0x170 [ 2296.650760] ? splice_direct_to_actor+0x387/0x980 [ 2296.651161] ? do_splice_direct+0x1c4/0x290 [ 2296.651524] ? do_sendfile+0x553/0x11e0 [ 2296.651859] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2296.652246] ? do_syscall_64+0x33/0x40 [ 2296.652572] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2296.653021] do_iter_readv_writev+0x476/0x750 [ 2296.653398] ? new_sync_write+0x660/0x660 [ 2296.653748] ? avc_policy_seqno+0x9/0x70 [ 2296.654090] ? selinux_file_permission+0x92/0x520 [ 2296.654567] ? security_file_permission+0xb1/0xe0 [ 2296.654981] do_iter_write+0x191/0x700 [ 2296.655311] ? trace_hardirqs_on+0x5b/0x180 [ 2296.655679] vfs_iter_write+0x70/0xa0 [ 2296.656002] iter_file_splice_write+0x762/0xc30 [ 2296.656402] ? generic_splice_sendpage+0x140/0x140 [ 2296.656825] ? security_file_permission+0xb1/0xe0 [ 2296.657232] ? generic_splice_sendpage+0x140/0x140 [ 2296.657642] direct_splice_actor+0x10f/0x170 [ 2296.658014] splice_direct_to_actor+0x387/0x980 [ 2296.658476] ? pipe_to_sendpage+0x380/0x380 [ 2296.658844] ? do_splice_to+0x160/0x160 [ 2296.659185] ? security_file_permission+0xb1/0xe0 [ 2296.659597] do_splice_direct+0x1c4/0x290 [ 2296.659947] ? splice_direct_to_actor+0x980/0x980 [ 2296.660352] ? avc_policy_seqno+0x9/0x70 [ 2296.660703] ? security_file_permission+0xb1/0xe0 [ 2296.661116] do_sendfile+0x553/0x11e0 [ 2296.661445] ? do_pwritev+0x270/0x270 [ 2296.661770] ? wait_for_completion_io+0x270/0x270 [ 2296.662185] ? rcu_read_lock_any_held+0x75/0xa0 [ 2296.662634] ? vfs_write+0x354/0xb10 [ 2296.662955] __x64_sys_sendfile64+0x1d1/0x210 [ 2296.663334] ? __ia32_sys_sendfile+0x220/0x220 [ 2296.663722] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2296.664162] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2296.664594] do_syscall_64+0x33/0x40 [ 2296.664906] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2296.665333] RIP: 0033:0x7fb2ec3f9b19 [ 2296.665647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2296.667221] RSP: 002b:00007fb2e996f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2296.667855] RAX: ffffffffffffffda RBX: 00007fb2ec50cf60 RCX: 00007fb2ec3f9b19 [ 2296.668447] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2296.669039] RBP: 00007fb2e996f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2296.669631] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2296.670223] R13: 00007ffdb4f283cf R14: 00007fb2e996f300 R15: 0000000000022000 23:32:48 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:32:48 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 10) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:32:48 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:32:48 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:32:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000002) 23:32:48 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 7) 23:32:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000003) 23:32:48 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2310.457093] FAULT_INJECTION: forcing a failure. [ 2310.457093] name failslab, interval 1, probability 0, space 0, times 0 [ 2310.458240] CPU: 1 PID: 12139 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2310.458859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2310.459561] Call Trace: [ 2310.459797] dump_stack+0x107/0x167 [ 2310.460109] should_fail.cold+0x5/0xa [ 2310.460438] ? percpu_ref_init+0xd8/0x3d0 [ 2310.460810] should_failslab+0x5/0x20 [ 2310.461139] kmem_cache_alloc_trace+0x55/0x320 [ 2310.461531] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 2310.461943] percpu_ref_init+0xd8/0x3d0 [ 2310.462287] cgroup_mkdir+0x28b/0xf50 [ 2310.462638] ? cgroup_destroy_locked+0x710/0x710 [ 2310.463061] kernfs_iop_mkdir+0x14d/0x1e0 [ 2310.463416] vfs_mkdir+0x493/0x750 [ 2310.463797] do_mkdirat+0x150/0x2b0 [ 2310.464191] ? user_path_create+0xf0/0xf0 [ 2310.464559] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2310.465020] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2310.465461] do_syscall_64+0x33/0x40 [ 2310.465781] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2310.466299] RIP: 0033:0x7f0c1cebab19 [ 2310.466728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2310.468364] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2310.469011] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2310.469618] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2310.470224] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2310.470837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2310.471446] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2310.479217] cgroup: Unknown subsys name 'perf_event' [ 2310.482302] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:32:49 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 11) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2310.560555] FAULT_INJECTION: forcing a failure. [ 2310.560555] name failslab, interval 1, probability 0, space 0, times 0 [ 2310.561800] CPU: 0 PID: 12151 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2310.562559] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2310.563287] Call Trace: [ 2310.563546] dump_stack+0x107/0x167 [ 2310.563884] should_fail.cold+0x5/0xa [ 2310.564246] ? jbd2__journal_start+0x190/0x7e0 [ 2310.564672] should_failslab+0x5/0x20 [ 2310.565025] kmem_cache_alloc+0x5b/0x310 [ 2310.565404] jbd2__journal_start+0x190/0x7e0 [ 2310.565819] __ext4_journal_start_sb+0x214/0x390 [ 2310.566262] ext4_dirty_inode+0xbc/0x130 [ 2310.566656] ? ext4_setattr+0x2160/0x2160 [ 2310.567028] __mark_inode_dirty+0x492/0xd40 [ 2310.567435] ? security_inode_need_killpriv+0x79/0xa0 [ 2310.567883] generic_update_time+0x21c/0x370 [ 2310.568266] file_update_time+0x43a/0x520 [ 2310.568621] ? evict_inodes+0x420/0x420 [ 2310.568964] ? down_write_killable+0x180/0x180 [ 2310.569353] file_modified+0x7d/0xa0 [ 2310.569671] ext4_file_write_iter+0x906/0x18d0 [ 2310.570068] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2310.570461] ? kasan_save_stack+0x32/0x40 [ 2310.571993] ? kasan_save_stack+0x1b/0x40 [ 2310.573405] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2310.574705] ? iter_file_splice_write+0x16d/0xc30 [ 2310.575138] ? direct_splice_actor+0x10f/0x170 [ 2310.575545] ? splice_direct_to_actor+0x387/0x980 [ 2310.575990] ? do_splice_direct+0x1c4/0x290 [ 2310.576396] ? do_sendfile+0x553/0x11e0 [ 2310.576767] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2310.577193] ? do_syscall_64+0x33/0x40 [ 2310.577549] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2310.578055] do_iter_readv_writev+0x476/0x750 [ 2310.578525] ? new_sync_write+0x660/0x660 [ 2310.578919] ? avc_policy_seqno+0x9/0x70 [ 2310.579300] ? selinux_file_permission+0x92/0x520 [ 2310.579761] ? security_file_permission+0xb1/0xe0 [ 2310.580224] do_iter_write+0x191/0x700 [ 2310.580600] ? trace_hardirqs_on+0x5b/0x180 [ 2310.581001] vfs_iter_write+0x70/0xa0 [ 2310.581356] iter_file_splice_write+0x762/0xc30 [ 2310.581804] ? generic_splice_sendpage+0x140/0x140 [ 2310.582287] ? security_file_permission+0xb1/0xe0 [ 2310.582305] FAULT_INJECTION: forcing a failure. [ 2310.582305] name failslab, interval 1, probability 0, space 0, times 0 [ 2310.583071] ? generic_splice_sendpage+0x140/0x140 [ 2310.583289] direct_splice_actor+0x10f/0x170 [ 2310.585861] splice_direct_to_actor+0x387/0x980 [ 2310.587483] ? pipe_to_sendpage+0x380/0x380 [ 2310.587974] ? do_splice_to+0x160/0x160 [ 2310.588718] ? security_file_permission+0xb1/0xe0 [ 2310.589333] do_splice_direct+0x1c4/0x290 [ 2310.589976] ? splice_direct_to_actor+0x980/0x980 [ 2310.590595] ? avc_policy_seqno+0x9/0x70 [ 2310.590986] ? security_file_permission+0xb1/0xe0 [ 2310.591443] do_sendfile+0x553/0x11e0 [ 2310.591807] ? do_pwritev+0x270/0x270 [ 2310.592171] ? wait_for_completion_io+0x270/0x270 [ 2310.592629] ? rcu_read_lock_any_held+0x75/0xa0 [ 2310.593058] ? vfs_write+0x354/0xb10 [ 2310.593417] __x64_sys_sendfile64+0x1d1/0x210 [ 2310.593839] ? __ia32_sys_sendfile+0x220/0x220 [ 2310.594270] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2310.594772] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2310.595254] do_syscall_64+0x33/0x40 [ 2310.595603] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2310.596074] RIP: 0033:0x7f9efa275b19 [ 2310.596419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2310.598072] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2310.598795] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2310.599441] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2310.600092] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2310.600749] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2310.601403] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 [ 2310.602075] CPU: 1 PID: 12165 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2310.602705] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2310.603482] Call Trace: [ 2310.603736] dump_stack+0x107/0x167 [ 2310.604105] should_fail.cold+0x5/0xa [ 2310.604463] ? percpu_ref_init+0xd8/0x3d0 [ 2310.604863] should_failslab+0x5/0x20 [ 2310.605234] kmem_cache_alloc_trace+0x55/0x320 [ 2310.605666] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 2310.606125] percpu_ref_init+0xd8/0x3d0 [ 2310.606526] cgroup_mkdir+0x28b/0xf50 [ 2310.606894] ? cgroup_destroy_locked+0x710/0x710 [ 2310.607371] kernfs_iop_mkdir+0x14d/0x1e0 [ 2310.607741] vfs_mkdir+0x493/0x750 [ 2310.608046] do_mkdirat+0x150/0x2b0 [ 2310.608367] ? user_path_create+0xf0/0xf0 [ 2310.608723] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2310.609165] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2310.609672] do_syscall_64+0x33/0x40 [ 2310.610051] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2310.610503] RIP: 0033:0x7f0c1cebab19 [ 2310.610926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2310.612757] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2310.613518] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2310.614307] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2310.615001] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2310.615824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2310.616524] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 23:32:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000004) 23:32:49 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000002) 23:32:49 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000002) 23:32:49 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:32:49 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 8) [ 2310.892593] cgroup: Unknown subsys name 'perf_event' [ 2310.894215] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:32:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000003) 23:32:49 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000002) 23:32:49 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 12) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2311.037475] FAULT_INJECTION: forcing a failure. [ 2311.037475] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.038858] CPU: 0 PID: 12181 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2311.039525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2311.040304] Call Trace: [ 2311.043752] dump_stack+0x107/0x167 [ 2311.044151] should_fail.cold+0x5/0xa [ 2311.044484] ? create_object.isra.0+0x3a/0xa20 [ 2311.044992] should_failslab+0x5/0x20 [ 2311.045330] kmem_cache_alloc+0x5b/0x310 [ 2311.045679] create_object.isra.0+0x3a/0xa20 [ 2311.046247] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2311.046751] __kmalloc+0x16e/0x390 [ 2311.047285] iter_file_splice_write+0x16d/0xc30 [ 2311.047729] ? atime_needs_update+0x600/0x600 [ 2311.048446] ? generic_splice_sendpage+0x140/0x140 [ 2311.048915] ? pipe_to_user+0x170/0x170 [ 2311.049322] ? security_file_permission+0xb1/0xe0 [ 2311.049777] ? generic_splice_sendpage+0x140/0x140 [ 2311.050245] direct_splice_actor+0x10f/0x170 [ 2311.050675] splice_direct_to_actor+0x387/0x980 [ 2311.051077] ? pipe_to_sendpage+0x380/0x380 [ 2311.051449] ? do_splice_to+0x160/0x160 [ 2311.051794] ? security_file_permission+0xb1/0xe0 [ 2311.052222] do_splice_direct+0x1c4/0x290 [ 2311.052577] ? splice_direct_to_actor+0x980/0x980 [ 2311.052994] ? avc_policy_seqno+0x9/0x70 [ 2311.053354] ? security_file_permission+0xb1/0xe0 [ 2311.053776] do_sendfile+0x553/0x11e0 [ 2311.054114] ? do_pwritev+0x270/0x270 [ 2311.054468] ? wait_for_completion_io+0x270/0x270 [ 2311.054965] ? rcu_read_lock_any_held+0x75/0xa0 [ 2311.055403] ? vfs_write+0x354/0xb10 [ 2311.055770] __x64_sys_sendfile64+0x1d1/0x210 [ 2311.056203] ? __ia32_sys_sendfile+0x220/0x220 [ 2311.056652] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2311.057153] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2311.057640] do_syscall_64+0x33/0x40 [ 2311.058004] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2311.058495] RIP: 0033:0x7f9efa275b19 [ 2311.058838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2311.060392] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2311.061044] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2311.061650] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2311.062348] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2311.063112] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2311.063789] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 23:32:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000005) [ 2311.199022] FAULT_INJECTION: forcing a failure. [ 2311.199022] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.200064] CPU: 0 PID: 12194 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2311.200654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2311.201361] Call Trace: [ 2311.201600] dump_stack+0x107/0x167 [ 2311.201920] should_fail.cold+0x5/0xa [ 2311.202256] ? create_object.isra.0+0x3a/0xa20 [ 2311.202699] should_failslab+0x5/0x20 [ 2311.203069] kmem_cache_alloc+0x5b/0x310 [ 2311.203464] create_object.isra.0+0x3a/0xa20 [ 2311.203860] kmemleak_alloc_percpu+0xa0/0x100 [ 2311.204259] pcpu_alloc+0x4e2/0x1240 [ 2311.204604] cgroup_rstat_init+0x14f/0x1f0 [ 2311.204979] cgroup_mkdir+0x709/0xf50 [ 2311.205320] ? cgroup_destroy_locked+0x710/0x710 [ 2311.205736] kernfs_iop_mkdir+0x14d/0x1e0 [ 2311.206094] vfs_mkdir+0x493/0x750 [ 2311.206406] do_mkdirat+0x150/0x2b0 [ 2311.206801] ? user_path_create+0xf0/0xf0 [ 2311.207167] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2311.207613] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2311.208054] do_syscall_64+0x33/0x40 [ 2311.208373] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2311.208808] RIP: 0033:0x7f0c1cebab19 [ 2311.209127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2311.210688] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2311.211345] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2311.211962] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2311.212574] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2311.213187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2311.213804] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2311.232269] cgroup: Unknown subsys name 'perf_event' [ 2311.238606] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:32:49 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000003) 23:32:49 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 13) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:32:49 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000003) 23:32:49 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 2311.402481] FAULT_INJECTION: forcing a failure. [ 2311.402481] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.403636] CPU: 0 PID: 12208 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2311.404256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2311.405034] Call Trace: [ 2311.405267] dump_stack+0x107/0x167 [ 2311.405581] should_fail.cold+0x5/0xa [ 2311.405910] ? create_object.isra.0+0x3a/0xa20 [ 2311.406309] should_failslab+0x5/0x20 [ 2311.406659] kmem_cache_alloc+0x5b/0x310 [ 2311.407013] ? mark_held_locks+0x9e/0xe0 [ 2311.407367] create_object.isra.0+0x3a/0xa20 [ 2311.407752] kmemleak_alloc_percpu+0xa0/0x100 [ 2311.408139] pcpu_alloc+0x4e2/0x1240 [ 2311.408481] cgroup_rstat_init+0x14f/0x1f0 [ 2311.408850] cgroup_mkdir+0x709/0xf50 [ 2311.409182] ? cgroup_destroy_locked+0x710/0x710 [ 2311.409596] kernfs_iop_mkdir+0x14d/0x1e0 [ 2311.409956] vfs_mkdir+0x493/0x750 [ 2311.410269] do_mkdirat+0x150/0x2b0 [ 2311.410597] ? user_path_create+0xf0/0xf0 [ 2311.410956] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2311.411405] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2311.411843] do_syscall_64+0x33/0x40 [ 2311.412164] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2311.412598] RIP: 0033:0x7f0c1cebab19 [ 2311.412915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2311.414464] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2311.415125] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2311.415740] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2311.416459] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2311.430958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2311.431574] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2311.505614] cgroup: Unknown subsys name 'perf_event' [ 2311.512551] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:33:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000006) 23:33:04 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 9) 23:33:04 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000004) 23:33:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000004) 23:33:04 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 14) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:33:04 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000004) 23:33:04 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000003) 23:33:04 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 2326.268751] FAULT_INJECTION: forcing a failure. [ 2326.268751] name failslab, interval 1, probability 0, space 0, times 0 [ 2326.269877] CPU: 1 PID: 12241 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2326.270564] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2326.271513] Call Trace: [ 2326.271822] dump_stack+0x107/0x167 [ 2326.272277] should_fail.cold+0x5/0xa [ 2326.272721] should_failslab+0x5/0x20 [ 2326.273130] __kmalloc_track_caller+0x79/0x370 [ 2326.273667] ? kstrdup_const+0x53/0x80 [ 2326.274077] ? find_held_lock+0x2c/0x110 [ 2326.274577] kstrdup+0x36/0x70 [ 2326.274870] kstrdup_const+0x53/0x80 [ 2326.275191] __kernfs_new_node+0x9d/0x860 [ 2326.275597] ? mark_held_locks+0x9e/0xe0 [ 2326.275945] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2326.276395] ? cpumask_next+0x1f/0x30 [ 2326.276723] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2326.277115] ? pcpu_alloc+0x12a/0x1240 [ 2326.277518] kernfs_new_node+0x18d/0x250 [ 2326.277869] kernfs_create_dir_ns+0x49/0x160 [ 2326.278321] cgroup_mkdir+0x318/0xf50 [ 2326.278662] ? cgroup_destroy_locked+0x710/0x710 [ 2326.279067] kernfs_iop_mkdir+0x14d/0x1e0 [ 2326.279475] vfs_mkdir+0x493/0x750 [ 2326.279780] do_mkdirat+0x150/0x2b0 [ 2326.280088] ? user_path_create+0xf0/0xf0 [ 2326.280495] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2326.280935] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2326.281424] do_syscall_64+0x33/0x40 [ 2326.281741] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2326.282173] RIP: 0033:0x7f0c1cebab19 [ 2326.282560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2326.284144] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2326.284826] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2326.285471] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2326.286065] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2326.286737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2326.287385] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2326.310149] FAULT_INJECTION: forcing a failure. [ 2326.310149] name failslab, interval 1, probability 0, space 0, times 0 [ 2326.311292] CPU: 1 PID: 12231 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2326.311873] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2326.312605] Call Trace: [ 2326.312837] dump_stack+0x107/0x167 [ 2326.313146] should_fail.cold+0x5/0xa [ 2326.313528] ? create_object.isra.0+0x3a/0xa20 [ 2326.313920] should_failslab+0x5/0x20 [ 2326.314319] kmem_cache_alloc+0x5b/0x310 [ 2326.314685] create_object.isra.0+0x3a/0xa20 [ 2326.315056] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2326.315537] kmem_cache_alloc+0x159/0x310 [ 2326.315893] alloc_buffer_head+0x20/0x110 [ 2326.316289] alloc_page_buffers+0x14d/0x700 [ 2326.316659] create_empty_buffers+0x2c/0x640 [ 2326.316899] cgroup: Unknown subsys name 'perf_event' [ 2326.317037] create_page_buffers+0x1bb/0x230 [ 2326.317900] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2326.318349] __block_write_begin_int+0x1d1/0x19c0 [ 2326.318778] ? fat_add_cluster+0x100/0x100 [ 2326.319140] ? add_to_page_cache_locked+0x40/0x40 [ 2326.319616] ? __page_cache_alloc+0x10d/0x360 [ 2326.320006] ? remove_inode_buffers+0x300/0x300 [ 2326.320445] ? pagecache_get_page+0x243/0xc80 [ 2326.320830] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2326.321329] ? wait_for_stable_page+0x92/0xe0 [ 2326.321710] cont_write_begin+0x472/0x980 [ 2326.322066] ? fat_add_cluster+0x100/0x100 [ 2326.322498] ? nobh_write_begin+0xed0/0xed0 [ 2326.322878] ? __mark_inode_dirty+0x93b/0xd40 [ 2326.323320] ? lock_downgrade+0x6d0/0x6d0 [ 2326.323675] ? do_raw_spin_lock+0x121/0x260 [ 2326.324044] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2326.324521] ? rwlock_bug.part.0+0x90/0x90 [ 2326.324881] fat_write_begin+0x89/0x180 [ 2326.325217] ? fat_add_cluster+0x100/0x100 [ 2326.325632] generic_perform_write+0x20a/0x4f0 [ 2326.326022] ? fat_direct_IO+0x1ef/0x380 [ 2326.326441] ? page_cache_prev_miss+0x310/0x310 [ 2326.326853] __generic_file_write_iter+0x2cd/0x5d0 [ 2326.327327] generic_file_write_iter+0xdb/0x230 [ 2326.327726] do_iter_readv_writev+0x476/0x750 [ 2326.328107] ? new_sync_write+0x660/0x660 [ 2326.328507] ? avc_policy_seqno+0x9/0x70 [ 2326.328863] ? selinux_file_permission+0x92/0x520 [ 2326.329453] ? security_file_permission+0xb1/0xe0 [ 2326.329868] do_iter_write+0x191/0x700 [ 2326.330201] ? trace_hardirqs_on+0x5b/0x180 [ 2326.330651] vfs_iter_write+0x70/0xa0 [ 2326.330990] iter_file_splice_write+0x762/0xc30 [ 2326.331448] ? generic_splice_sendpage+0x140/0x140 [ 2326.331877] ? security_file_permission+0xb1/0xe0 [ 2326.332336] ? generic_splice_sendpage+0x140/0x140 [ 2326.332754] direct_splice_actor+0x10f/0x170 [ 2326.333127] splice_direct_to_actor+0x387/0x980 [ 2326.333578] ? pipe_to_sendpage+0x380/0x380 [ 2326.333948] ? do_splice_to+0x160/0x160 [ 2326.334363] ? security_file_permission+0xb1/0xe0 [ 2326.334789] do_splice_direct+0x1c4/0x290 [ 2326.335141] ? splice_direct_to_actor+0x980/0x980 [ 2326.335603] ? avc_policy_seqno+0x9/0x70 [ 2326.335955] ? security_file_permission+0xb1/0xe0 [ 2326.336415] do_sendfile+0x553/0x11e0 [ 2326.336748] ? do_pwritev+0x270/0x270 [ 2326.337079] ? wait_for_completion_io+0x270/0x270 [ 2326.337552] ? rcu_read_lock_any_held+0x75/0xa0 [ 2326.337946] ? vfs_write+0x354/0xb10 [ 2326.338343] __x64_sys_sendfile64+0x1d1/0x210 [ 2326.338738] ? __ia32_sys_sendfile+0x220/0x220 [ 2326.339139] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2326.339637] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2326.340077] do_syscall_64+0x33/0x40 [ 2326.340441] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2326.340875] RIP: 0033:0x7f9efa275b19 [ 2326.341192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2326.342849] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2326.343540] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2326.345400] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2326.345996] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2326.346673] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2326.347321] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 23:33:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000007) 23:33:18 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:33:18 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000005) 23:33:18 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000004) 23:33:18 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000005) 23:33:18 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 10) 23:33:18 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 15) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:33:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000008) 23:33:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000005) [ 2340.221171] FAULT_INJECTION: forcing a failure. [ 2340.221171] name failslab, interval 1, probability 0, space 0, times 0 [ 2340.222309] CPU: 0 PID: 12288 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2340.222927] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2340.223674] Call Trace: [ 2340.223915] dump_stack+0x107/0x167 [ 2340.224276] should_fail.cold+0x5/0xa [ 2340.224617] ? create_object.isra.0+0x3a/0xa20 [ 2340.225008] should_failslab+0x5/0x20 [ 2340.225380] kmem_cache_alloc+0x5b/0x310 [ 2340.225726] create_object.isra.0+0x3a/0xa20 [ 2340.226097] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2340.226604] __kmalloc_track_caller+0x177/0x370 [ 2340.227021] ? kstrdup_const+0x53/0x80 [ 2340.227397] ? find_held_lock+0x2c/0x110 [ 2340.227748] kstrdup+0x36/0x70 [ 2340.228025] kstrdup_const+0x53/0x80 [ 2340.228392] __kernfs_new_node+0x9d/0x860 [ 2340.228746] ? mark_held_locks+0x9e/0xe0 [ 2340.229093] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2340.229540] ? cpumask_next+0x1f/0x30 [ 2340.229870] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2340.230337] ? pcpu_alloc+0x12a/0x1240 [ 2340.230675] kernfs_new_node+0x18d/0x250 [ 2340.231041] kernfs_create_dir_ns+0x49/0x160 [ 2340.231467] cgroup_mkdir+0x318/0xf50 [ 2340.231796] ? cgroup_destroy_locked+0x710/0x710 [ 2340.232201] kernfs_iop_mkdir+0x14d/0x1e0 [ 2340.232597] vfs_mkdir+0x493/0x750 [ 2340.232902] do_mkdirat+0x150/0x2b0 [ 2340.233211] ? user_path_create+0xf0/0xf0 [ 2340.233617] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2340.234059] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2340.234570] do_syscall_64+0x33/0x40 [ 2340.234915] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2340.235396] RIP: 0033:0x7f0c1cebab19 [ 2340.235714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2340.237338] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2340.237980] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2340.238652] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2340.239320] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2340.239918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2340.240556] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2340.253207] cgroup: Unknown subsys name 'perf_event' [ 2340.255843] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2340.272576] FAULT_INJECTION: forcing a failure. [ 2340.272576] name failslab, interval 1, probability 0, space 0, times 0 [ 2340.273739] CPU: 1 PID: 12285 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2340.274364] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2340.275116] Call Trace: [ 2340.275347] dump_stack+0x107/0x167 [ 2340.275656] should_fail.cold+0x5/0xa [ 2340.276052] ? create_object.isra.0+0x3a/0xa20 [ 2340.276442] should_failslab+0x5/0x20 [ 2340.276764] kmem_cache_alloc+0x5b/0x310 [ 2340.277165] create_object.isra.0+0x3a/0xa20 [ 2340.277537] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2340.278014] kmem_cache_alloc+0x159/0x310 [ 2340.278373] alloc_buffer_head+0x20/0x110 [ 2340.278724] alloc_page_buffers+0x14d/0x700 [ 2340.279161] create_empty_buffers+0x2c/0x640 [ 2340.279542] create_page_buffers+0x1bb/0x230 [ 2340.279993] __block_write_begin_int+0x1d1/0x19c0 [ 2340.280408] ? fat_add_cluster+0x100/0x100 [ 2340.280774] ? add_to_page_cache_locked+0x40/0x40 [ 2340.281237] ? __page_cache_alloc+0x10d/0x360 [ 2340.281622] ? remove_inode_buffers+0x300/0x300 [ 2340.282069] ? pagecache_get_page+0x243/0xc80 [ 2340.282460] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2340.282982] ? wait_for_stable_page+0x92/0xe0 [ 2340.283367] cont_write_begin+0x472/0x980 [ 2340.283721] ? fat_add_cluster+0x100/0x100 [ 2340.284149] ? nobh_write_begin+0xed0/0xed0 [ 2340.284514] ? __mark_inode_dirty+0x93b/0xd40 [ 2340.284953] ? lock_downgrade+0x6d0/0x6d0 [ 2340.285311] ? do_raw_spin_lock+0x121/0x260 [ 2340.285687] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2340.286170] ? rwlock_bug.part.0+0x90/0x90 [ 2340.286533] fat_write_begin+0x89/0x180 [ 2340.286935] ? fat_add_cluster+0x100/0x100 [ 2340.287294] generic_perform_write+0x20a/0x4f0 [ 2340.287680] ? fat_direct_IO+0x1ef/0x380 [ 2340.288093] ? page_cache_prev_miss+0x310/0x310 [ 2340.288498] __generic_file_write_iter+0x2cd/0x5d0 [ 2340.288978] generic_file_write_iter+0xdb/0x230 [ 2340.289383] do_iter_readv_writev+0x476/0x750 [ 2340.289769] ? new_sync_write+0x660/0x660 [ 2340.290176] ? avc_policy_seqno+0x9/0x70 [ 2340.290521] ? selinux_file_permission+0x92/0x520 [ 2340.291005] ? security_file_permission+0xb1/0xe0 [ 2340.291423] do_iter_write+0x191/0x700 [ 2340.291761] ? trace_hardirqs_on+0x5b/0x180 [ 2340.292201] vfs_iter_write+0x70/0xa0 [ 2340.292528] iter_file_splice_write+0x762/0xc30 [ 2340.292985] ? generic_splice_sendpage+0x140/0x140 [ 2340.293420] ? security_file_permission+0xb1/0xe0 [ 2340.293828] ? generic_splice_sendpage+0x140/0x140 [ 2340.294295] direct_splice_actor+0x10f/0x170 [ 2340.294680] splice_direct_to_actor+0x387/0x980 [ 2340.295145] ? pipe_to_sendpage+0x380/0x380 [ 2340.295517] ? do_splice_to+0x160/0x160 [ 2340.295918] ? security_file_permission+0xb1/0xe0 [ 2340.296343] do_splice_direct+0x1c4/0x290 [ 2340.296697] ? splice_direct_to_actor+0x980/0x980 [ 2340.297161] ? avc_policy_seqno+0x9/0x70 [ 2340.297517] ? security_file_permission+0xb1/0xe0 [ 2340.297981] do_sendfile+0x553/0x11e0 [ 2340.298316] ? do_pwritev+0x270/0x270 [ 2340.298648] ? wait_for_completion_io+0x270/0x270 [ 2340.299128] ? rcu_read_lock_any_held+0x75/0xa0 [ 2340.299519] ? vfs_write+0x354/0xb10 [ 2340.299838] __x64_sys_sendfile64+0x1d1/0x210 [ 2340.300292] ? __ia32_sys_sendfile+0x220/0x220 [ 2340.300686] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2340.301182] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2340.301630] do_syscall_64+0x33/0x40 [ 2340.301999] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2340.302437] RIP: 0033:0x7f9efa275b19 [ 2340.302758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2340.304423] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2340.305115] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2340.305709] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2340.306346] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2340.307012] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2340.307611] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 23:33:18 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:33:18 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 11) 23:33:18 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 16) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2340.507637] FAULT_INJECTION: forcing a failure. [ 2340.507637] name failslab, interval 1, probability 0, space 0, times 0 [ 2340.508999] CPU: 1 PID: 12303 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2340.509610] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2340.510374] Call Trace: [ 2340.510627] dump_stack+0x107/0x167 [ 2340.511057] should_fail.cold+0x5/0xa [ 2340.511414] ? create_object.isra.0+0x3a/0xa20 [ 2340.511835] should_failslab+0x5/0x20 [ 2340.512242] kmem_cache_alloc+0x5b/0x310 [ 2340.512620] create_object.isra.0+0x3a/0xa20 [ 2340.513070] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2340.513532] kmem_cache_alloc+0x159/0x310 [ 2340.513968] alloc_buffer_head+0x20/0x110 [ 2340.514341] alloc_page_buffers+0x14d/0x700 [ 2340.514729] create_empty_buffers+0x2c/0x640 [ 2340.515196] create_page_buffers+0x1bb/0x230 [ 2340.515573] __block_write_begin_int+0x1d1/0x19c0 [ 2340.516039] ? fat_add_cluster+0x100/0x100 [ 2340.516400] ? add_to_page_cache_locked+0x40/0x40 [ 2340.516804] ? __page_cache_alloc+0x10d/0x360 [ 2340.517234] ? remove_inode_buffers+0x300/0x300 [ 2340.517625] ? pagecache_get_page+0x243/0xc80 [ 2340.518057] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2340.518501] ? wait_for_stable_page+0x92/0xe0 [ 2340.518974] cont_write_begin+0x472/0x980 [ 2340.519329] ? fat_add_cluster+0x100/0x100 [ 2340.519684] ? nobh_write_begin+0xed0/0xed0 [ 2340.520109] ? __mark_inode_dirty+0x93b/0xd40 [ 2340.520499] ? lock_downgrade+0x6d0/0x6d0 [ 2340.520900] ? do_raw_spin_lock+0x121/0x260 [ 2340.521272] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2340.521697] ? rwlock_bug.part.0+0x90/0x90 [ 2340.522106] fat_write_begin+0x89/0x180 [ 2340.522442] ? fat_add_cluster+0x100/0x100 [ 2340.522817] generic_perform_write+0x20a/0x4f0 [ 2340.523309] ? fat_direct_IO+0x1ef/0x380 [ 2340.523656] ? page_cache_prev_miss+0x310/0x310 [ 2340.524112] __generic_file_write_iter+0x2cd/0x5d0 [ 2340.524555] generic_file_write_iter+0xdb/0x230 [ 2340.524999] do_iter_readv_writev+0x476/0x750 [ 2340.525379] ? new_sync_write+0x660/0x660 [ 2340.525731] ? avc_policy_seqno+0x9/0x70 [ 2340.526121] ? selinux_file_permission+0x92/0x520 [ 2340.526535] ? security_file_permission+0xb1/0xe0 [ 2340.527033] do_iter_write+0x191/0x700 [ 2340.527364] ? trace_hardirqs_on+0x5b/0x180 [ 2340.527730] vfs_iter_write+0x70/0xa0 [ 2340.528107] iter_file_splice_write+0x762/0xc30 [ 2340.528507] ? generic_splice_sendpage+0x140/0x140 [ 2340.528983] ? security_file_permission+0xb1/0xe0 [ 2340.529392] ? generic_splice_sendpage+0x140/0x140 [ 2340.529804] direct_splice_actor+0x10f/0x170 [ 2340.530223] splice_direct_to_actor+0x387/0x980 [ 2340.530616] ? pipe_to_sendpage+0x380/0x380 [ 2340.531073] ? do_splice_to+0x160/0x160 [ 2340.531412] ? security_file_permission+0xb1/0xe0 [ 2340.534632] do_splice_direct+0x1c4/0x290 [ 2340.535081] ? splice_direct_to_actor+0x980/0x980 [ 2340.535488] ? avc_policy_seqno+0x9/0x70 [ 2340.535837] ? security_file_permission+0xb1/0xe0 [ 2340.536301] do_sendfile+0x553/0x11e0 [ 2340.536632] ? do_pwritev+0x270/0x270 [ 2340.537011] ? wait_for_completion_io+0x270/0x270 [ 2340.537422] ? rcu_read_lock_any_held+0x75/0xa0 [ 2340.537811] ? vfs_write+0x354/0xb10 [ 2340.538181] __x64_sys_sendfile64+0x1d1/0x210 [ 2340.538560] ? __ia32_sys_sendfile+0x220/0x220 [ 2340.539035] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2340.539476] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2340.539963] do_syscall_64+0x33/0x40 [ 2340.540279] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2340.540708] RIP: 0033:0x7f9efa275b19 [ 2340.541073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2340.542638] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2340.543360] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2340.544004] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2340.544595] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2340.545233] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2340.545826] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 23:33:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000009) 23:33:19 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000006) 23:33:19 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 12) 23:33:19 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000005) 23:33:19 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000006) 23:33:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000006) 23:33:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x10000000a) [ 2340.732664] FAULT_INJECTION: forcing a failure. [ 2340.732664] name failslab, interval 1, probability 0, space 0, times 0 [ 2340.734579] CPU: 0 PID: 12316 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2340.735295] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2340.736011] Call Trace: [ 2340.736264] dump_stack+0x107/0x167 [ 2340.736581] should_fail.cold+0x5/0xa [ 2340.736912] ? __kernfs_new_node+0xd4/0x860 [ 2340.737285] should_failslab+0x5/0x20 [ 2340.737612] kmem_cache_alloc+0x5b/0x310 [ 2340.737962] __kernfs_new_node+0xd4/0x860 [ 2340.738316] ? mark_held_locks+0x9e/0xe0 [ 2340.738665] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2340.739087] ? cpumask_next+0x1f/0x30 [ 2340.739416] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2340.739812] ? pcpu_alloc+0x12a/0x1240 [ 2340.740153] kernfs_new_node+0x18d/0x250 [ 2340.740506] kernfs_create_dir_ns+0x49/0x160 [ 2340.740887] cgroup_mkdir+0x318/0xf50 [ 2340.741217] ? cgroup_destroy_locked+0x710/0x710 [ 2340.741622] kernfs_iop_mkdir+0x14d/0x1e0 [ 2340.741977] vfs_mkdir+0x493/0x750 [ 2340.742283] do_mkdirat+0x150/0x2b0 [ 2340.742596] ? user_path_create+0xf0/0xf0 [ 2340.742965] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2340.743407] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2340.743844] do_syscall_64+0x33/0x40 [ 2340.744162] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2340.744594] RIP: 0033:0x7f0c1cebab19 [ 2340.744910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2340.746445] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2340.747115] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2340.747719] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2340.748329] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2340.748942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2340.749553] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2340.812830] FAULT_INJECTION: forcing a failure. [ 2340.812830] name failslab, interval 1, probability 0, space 0, times 0 [ 2340.813859] CPU: 0 PID: 12324 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2340.814438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2340.815144] Call Trace: [ 2340.815372] dump_stack+0x107/0x167 [ 2340.815684] should_fail.cold+0x5/0xa [ 2340.816012] ? create_object.isra.0+0x3a/0xa20 [ 2340.816400] should_failslab+0x5/0x20 [ 2340.816726] kmem_cache_alloc+0x5b/0x310 [ 2340.817075] create_object.isra.0+0x3a/0xa20 [ 2340.817447] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2340.817882] kmem_cache_alloc+0x159/0x310 [ 2340.818239] alloc_buffer_head+0x20/0x110 [ 2340.818587] alloc_page_buffers+0x14d/0x700 [ 2340.818976] create_empty_buffers+0x2c/0x640 [ 2340.819354] create_page_buffers+0x1bb/0x230 [ 2340.819730] __block_write_begin_int+0x1d1/0x19c0 [ 2340.820144] ? fat_add_cluster+0x100/0x100 [ 2340.820505] ? add_to_page_cache_locked+0x40/0x40 [ 2340.820912] ? __page_cache_alloc+0x10d/0x360 [ 2340.821295] ? remove_inode_buffers+0x300/0x300 [ 2340.821687] ? pagecache_get_page+0x243/0xc80 [ 2340.822068] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2340.822517] ? wait_for_stable_page+0x92/0xe0 [ 2340.822594] cgroup: Unknown subsys name 'perf_event' [ 2340.822915] cont_write_begin+0x472/0x980 [ 2340.822933] ? fat_add_cluster+0x100/0x100 [ 2340.822952] ? nobh_write_begin+0xed0/0xed0 [ 2340.824487] ? __mark_inode_dirty+0x93b/0xd40 [ 2340.824700] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2340.824869] ? lock_downgrade+0x6d0/0x6d0 [ 2340.824886] ? do_raw_spin_lock+0x121/0x260 [ 2340.824899] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2340.824912] ? rwlock_bug.part.0+0x90/0x90 [ 2340.824930] fat_write_begin+0x89/0x180 [ 2340.827123] ? fat_add_cluster+0x100/0x100 [ 2340.827487] generic_perform_write+0x20a/0x4f0 [ 2340.827884] ? fat_direct_IO+0x1ef/0x380 [ 2340.828232] ? page_cache_prev_miss+0x310/0x310 [ 2340.828642] __generic_file_write_iter+0x2cd/0x5d0 [ 2340.829068] generic_file_write_iter+0xdb/0x230 [ 2340.829468] do_iter_readv_writev+0x476/0x750 [ 2340.829856] ? new_sync_write+0x660/0x660 [ 2340.830217] ? avc_policy_seqno+0x9/0x70 [ 2340.830563] ? selinux_file_permission+0x92/0x520 [ 2340.831004] ? security_file_permission+0xb1/0xe0 [ 2340.831423] do_iter_write+0x191/0x700 [ 2340.831758] ? trace_hardirqs_on+0x5b/0x180 [ 2340.832133] vfs_iter_write+0x70/0xa0 [ 2340.832461] iter_file_splice_write+0x762/0xc30 [ 2340.832868] ? generic_splice_sendpage+0x140/0x140 [ 2340.833300] ? security_file_permission+0xb1/0xe0 [ 2340.833710] ? generic_splice_sendpage+0x140/0x140 [ 2340.834130] direct_splice_actor+0x10f/0x170 [ 2340.834505] splice_direct_to_actor+0x387/0x980 [ 2340.834917] ? pipe_to_sendpage+0x380/0x380 [ 2340.835290] ? do_splice_to+0x160/0x160 [ 2340.835631] ? security_file_permission+0xb1/0xe0 [ 2340.836045] do_splice_direct+0x1c4/0x290 [ 2340.836400] ? splice_direct_to_actor+0x980/0x980 [ 2340.836806] ? avc_policy_seqno+0x9/0x70 [ 2340.837161] ? security_file_permission+0xb1/0xe0 [ 2340.837577] do_sendfile+0x553/0x11e0 [ 2340.837910] ? do_pwritev+0x270/0x270 [ 2340.838241] ? wait_for_completion_io+0x270/0x270 [ 2340.838657] ? rcu_read_lock_any_held+0x75/0xa0 [ 2340.839068] ? vfs_write+0x354/0xb10 [ 2340.839391] __x64_sys_sendfile64+0x1d1/0x210 [ 2340.839774] ? __ia32_sys_sendfile+0x220/0x220 [ 2340.840166] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2340.840609] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2340.841045] do_syscall_64+0x33/0x40 [ 2340.841362] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2340.841795] RIP: 0033:0x7f9efa275b19 [ 2340.842112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2340.843670] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2340.844312] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2340.844911] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2340.845511] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2340.846114] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2340.846714] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 23:33:19 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 17) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2340.968296] FAULT_INJECTION: forcing a failure. [ 2340.968296] name failslab, interval 1, probability 0, space 0, times 0 [ 2340.969476] CPU: 1 PID: 12342 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2340.970113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2340.970812] Call Trace: [ 2340.971136] dump_stack+0x107/0x167 [ 2340.971448] should_fail.cold+0x5/0xa [ 2340.971778] ? create_object.isra.0+0x3a/0xa20 [ 2340.972244] should_failslab+0x5/0x20 [ 2340.972572] kmem_cache_alloc+0x5b/0x310 [ 2340.972972] create_object.isra.0+0x3a/0xa20 [ 2340.973347] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2340.973779] kmem_cache_alloc+0x159/0x310 [ 2340.974188] __kernfs_new_node+0xd4/0x860 [ 2340.974543] ? mark_held_locks+0x9e/0xe0 [ 2340.974964] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2340.975367] ? cpumask_next+0x1f/0x30 [ 2340.975693] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2340.976164] ? pcpu_alloc+0x12a/0x1240 [ 2340.976502] kernfs_new_node+0x18d/0x250 [ 2340.976894] kernfs_create_dir_ns+0x49/0x160 [ 2340.977284] cgroup_mkdir+0x318/0xf50 [ 2340.977610] ? cgroup_destroy_locked+0x710/0x710 [ 2340.978060] kernfs_iop_mkdir+0x14d/0x1e0 [ 2340.978412] vfs_mkdir+0x493/0x750 [ 2340.978716] do_mkdirat+0x150/0x2b0 [ 2340.979091] ? user_path_create+0xf0/0xf0 [ 2340.979445] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2340.979963] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2340.980398] do_syscall_64+0x33/0x40 [ 2340.980714] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2340.981191] RIP: 0033:0x7f0c1cebab19 [ 2340.981509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2340.983136] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2340.983772] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2340.984436] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2340.985077] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2340.985670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2340.986310] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 23:33:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000007) [ 2341.097696] cgroup: Unknown subsys name 'perf_event' [ 2341.104521] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:33:33 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:33:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000008) 23:33:33 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000006) 23:33:33 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000007) 23:33:33 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 13) 23:33:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x10000000b) 23:33:33 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 18) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:33:33 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000007) [ 2354.678116] FAULT_INJECTION: forcing a failure. [ 2354.678116] name failslab, interval 1, probability 0, space 0, times 0 [ 2354.679163] CPU: 0 PID: 12367 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2354.679708] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2354.680362] Call Trace: [ 2354.680582] dump_stack+0x107/0x167 [ 2354.680877] should_fail.cold+0x5/0xa [ 2354.681193] ? selinux_kernfs_init_security+0x137/0x4c0 [ 2354.681627] should_failslab+0x5/0x20 [ 2354.681941] __kmalloc+0x72/0x390 [ 2354.682230] selinux_kernfs_init_security+0x137/0x4c0 [ 2354.682643] ? selinux_file_mprotect+0x610/0x610 [ 2354.683044] ? find_held_lock+0x2c/0x110 [ 2354.683382] ? __kernfs_new_node+0x2ad/0x860 [ 2354.683738] ? lock_downgrade+0x6d0/0x6d0 [ 2354.684078] ? rwlock_bug.part.0+0x90/0x90 [ 2354.684432] security_kernfs_init_security+0x4e/0xb0 [ 2354.684842] __kernfs_new_node+0x531/0x860 [ 2354.685190] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2354.685585] ? cpumask_next+0x1f/0x30 [ 2354.685897] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2354.686276] ? pcpu_alloc+0x12a/0x1240 [ 2354.686600] kernfs_new_node+0x18d/0x250 [ 2354.686948] kernfs_create_dir_ns+0x49/0x160 [ 2354.687318] cgroup_mkdir+0x318/0xf50 [ 2354.687630] ? cgroup_destroy_locked+0x710/0x710 [ 2354.688017] kernfs_iop_mkdir+0x14d/0x1e0 [ 2354.688353] vfs_mkdir+0x493/0x750 [ 2354.688643] do_mkdirat+0x150/0x2b0 [ 2354.688941] ? user_path_create+0xf0/0xf0 [ 2354.689276] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2354.689695] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2354.690110] do_syscall_64+0x33/0x40 [ 2354.690411] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2354.690819] RIP: 0033:0x7f0c1cebab19 [ 2354.691133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2354.692580] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2354.693186] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2354.693754] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2354.694327] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2354.694892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2354.695472] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2354.715210] cgroup: Unknown subsys name 'perf_event' [ 2354.717381] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2354.773490] FAULT_INJECTION: forcing a failure. [ 2354.773490] name failslab, interval 1, probability 0, space 0, times 0 [ 2354.774764] CPU: 1 PID: 12373 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2354.775508] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2354.776367] Call Trace: [ 2354.776627] dump_stack+0x107/0x167 [ 2354.777047] should_fail.cold+0x5/0xa [ 2354.777407] ? create_object.isra.0+0x3a/0xa20 [ 2354.777831] should_failslab+0x5/0x20 [ 2354.778287] kmem_cache_alloc+0x5b/0x310 [ 2354.778666] create_object.isra.0+0x3a/0xa20 [ 2354.780100] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2354.780540] kmem_cache_alloc+0x159/0x310 [ 2354.780949] alloc_buffer_head+0x20/0x110 [ 2354.781305] alloc_page_buffers+0x14d/0x700 [ 2354.781682] create_empty_buffers+0x2c/0x640 [ 2354.782114] create_page_buffers+0x1bb/0x230 [ 2354.782498] __block_write_begin_int+0x1d1/0x19c0 [ 2354.783036] ? fat_add_cluster+0x100/0x100 [ 2354.783501] ? add_to_page_cache_locked+0x40/0x40 [ 2354.783995] ? __page_cache_alloc+0x10d/0x360 [ 2354.784415] ? remove_inode_buffers+0x300/0x300 [ 2354.784885] ? pagecache_get_page+0x243/0xc80 [ 2354.785309] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2354.785791] ? wait_for_stable_page+0x92/0xe0 [ 2354.786265] cont_write_begin+0x472/0x980 [ 2354.786651] ? fat_add_cluster+0x100/0x100 [ 2354.787157] ? nobh_write_begin+0xed0/0xed0 [ 2354.787549] ? __mark_inode_dirty+0x93b/0xd40 [ 2354.788072] ? lock_downgrade+0x6d0/0x6d0 [ 2354.788454] ? do_raw_spin_lock+0x121/0x260 [ 2354.788918] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2354.789389] ? rwlock_bug.part.0+0x90/0x90 [ 2354.789778] fat_write_begin+0x89/0x180 [ 2354.790201] ? fat_add_cluster+0x100/0x100 [ 2354.790589] generic_perform_write+0x20a/0x4f0 [ 2354.791137] ? fat_direct_IO+0x1ef/0x380 [ 2354.791504] ? page_cache_prev_miss+0x310/0x310 [ 2354.792047] __generic_file_write_iter+0x2cd/0x5d0 [ 2354.792493] generic_file_write_iter+0xdb/0x230 [ 2354.792978] do_iter_readv_writev+0x476/0x750 [ 2354.793387] ? new_sync_write+0x660/0x660 [ 2354.793767] ? avc_policy_seqno+0x9/0x70 [ 2354.794198] ? selinux_file_permission+0x92/0x520 [ 2354.794646] ? security_file_permission+0xb1/0xe0 [ 2354.795237] do_iter_write+0x191/0x700 [ 2354.795597] ? trace_hardirqs_on+0x5b/0x180 [ 2354.796112] vfs_iter_write+0x70/0xa0 [ 2354.796463] iter_file_splice_write+0x762/0xc30 [ 2354.796948] ? generic_splice_sendpage+0x140/0x140 [ 2354.797415] ? security_file_permission+0xb1/0xe0 [ 2354.797905] ? generic_splice_sendpage+0x140/0x140 [ 2354.798358] direct_splice_actor+0x10f/0x170 [ 2354.798760] splice_direct_to_actor+0x387/0x980 [ 2354.799340] ? pipe_to_sendpage+0x380/0x380 [ 2354.799749] ? do_splice_to+0x160/0x160 [ 2354.800163] ? security_file_permission+0xb1/0xe0 [ 2354.800606] do_splice_direct+0x1c4/0x290 [ 2354.801033] ? splice_direct_to_actor+0x980/0x980 [ 2354.801472] ? avc_policy_seqno+0x9/0x70 [ 2354.801900] ? security_file_permission+0xb1/0xe0 [ 2354.802354] do_sendfile+0x553/0x11e0 [ 2354.802715] ? do_pwritev+0x270/0x270 [ 2354.803241] ? wait_for_completion_io+0x270/0x270 [ 2354.803683] ? rcu_read_lock_any_held+0x75/0xa0 [ 2354.804152] ? vfs_write+0x354/0xb10 [ 2354.804503] __x64_sys_sendfile64+0x1d1/0x210 [ 2354.804967] ? __ia32_sys_sendfile+0x220/0x220 [ 2354.805387] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2354.805915] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2354.806390] do_syscall_64+0x33/0x40 [ 2354.806733] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2354.807364] RIP: 0033:0x7f9efa275b19 [ 2354.807685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2354.809294] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2354.809979] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2354.810573] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2354.811306] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2354.812052] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2354.812690] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 23:33:33 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 19) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:33:33 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000007) [ 2354.896260] FAULT_INJECTION: forcing a failure. [ 2354.896260] name failslab, interval 1, probability 0, space 0, times 0 [ 2354.897455] CPU: 0 PID: 12390 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2354.898025] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2354.898696] Call Trace: [ 2354.898920] dump_stack+0x107/0x167 [ 2354.899234] should_fail.cold+0x5/0xa [ 2354.899552] ? create_object.isra.0+0x3a/0xa20 [ 2354.899938] should_failslab+0x5/0x20 [ 2354.900257] kmem_cache_alloc+0x5b/0x310 [ 2354.900603] ? stack_trace_consume_entry+0x160/0x160 [ 2354.901019] create_object.isra.0+0x3a/0xa20 [ 2354.901377] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2354.901799] kmem_cache_alloc+0x159/0x310 [ 2354.902152] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2354.902606] radix_tree_extend+0x231/0x490 [ 2354.902968] idr_get_free+0x623/0x8f0 [ 2354.903293] idr_alloc_u32+0x170/0x2d0 [ 2354.903612] ? __fprop_inc_percpu_max+0x130/0x130 [ 2354.904013] ? lock_acquire+0x197/0x470 [ 2354.904346] ? __kernfs_new_node+0xff/0x860 [ 2354.904700] idr_alloc_cyclic+0x102/0x230 [ 2354.905042] ? idr_alloc+0x130/0x130 [ 2354.905343] ? rwlock_bug.part.0+0x90/0x90 [ 2354.905693] __kernfs_new_node+0x117/0x860 [ 2354.906035] ? mark_held_locks+0x9e/0xe0 [ 2354.906373] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2354.906764] ? cpumask_next+0x1f/0x30 [ 2354.907103] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2354.907489] ? pcpu_alloc+0x12a/0x1240 [ 2354.907811] kernfs_new_node+0x18d/0x250 [ 2354.908152] kernfs_create_dir_ns+0x49/0x160 [ 2354.908524] cgroup_mkdir+0x318/0xf50 [ 2354.908840] ? cgroup_destroy_locked+0x710/0x710 [ 2354.909230] kernfs_iop_mkdir+0x14d/0x1e0 [ 2354.909576] vfs_mkdir+0x493/0x750 [ 2354.909872] do_mkdirat+0x150/0x2b0 [ 2354.910176] ? user_path_create+0xf0/0xf0 [ 2354.910515] ? __x64_sys_mkdirat+0x64/0xb0 [ 2354.910858] do_syscall_64+0x33/0x40 [ 2354.911181] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2354.911589] RIP: 0033:0x7f0c1cebab19 [ 2354.911895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2354.913372] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2354.913982] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2354.914555] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2354.915142] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2354.915706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2354.916279] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 23:33:33 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 14) [ 2355.055348] cgroup: Unknown subsys name 'perf_event' [ 2355.059096] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:33:33 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000008) 23:33:33 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000008) 23:33:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x10000000c) 23:33:33 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 20) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:33:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000009) [ 2355.145697] FAULT_INJECTION: forcing a failure. [ 2355.145697] name failslab, interval 1, probability 0, space 0, times 0 [ 2355.146718] CPU: 0 PID: 12404 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2355.147334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2355.147982] Call Trace: [ 2355.148202] dump_stack+0x107/0x167 [ 2355.148499] should_fail.cold+0x5/0xa [ 2355.148807] ? create_object.isra.0+0x3a/0xa20 [ 2355.149179] should_failslab+0x5/0x20 [ 2355.149493] kmem_cache_alloc+0x5b/0x310 [ 2355.149820] create_object.isra.0+0x3a/0xa20 [ 2355.150176] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2355.150582] kmem_cache_alloc+0x159/0x310 [ 2355.150918] alloc_buffer_head+0x20/0x110 [ 2355.151270] alloc_page_buffers+0x14d/0x700 [ 2355.151624] create_empty_buffers+0x2c/0x640 [ 2355.151979] create_page_buffers+0x1bb/0x230 [ 2355.152332] __block_write_begin_int+0x1d1/0x19c0 [ 2355.152723] ? fat_add_cluster+0x100/0x100 [ 2355.153063] ? add_to_page_cache_locked+0x40/0x40 [ 2355.153447] ? __page_cache_alloc+0x10d/0x360 [ 2355.153811] ? remove_inode_buffers+0x300/0x300 [ 2355.154182] ? pagecache_get_page+0x243/0xc80 [ 2355.154545] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2355.154972] ? wait_for_stable_page+0x92/0xe0 [ 2355.155368] cont_write_begin+0x472/0x980 [ 2355.155705] ? fat_add_cluster+0x100/0x100 [ 2355.156046] ? nobh_write_begin+0xed0/0xed0 [ 2355.156390] ? __mark_inode_dirty+0x93b/0xd40 [ 2355.156753] ? lock_downgrade+0x6d0/0x6d0 [ 2355.157090] ? do_raw_spin_lock+0x121/0x260 [ 2355.157434] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2355.157845] ? rwlock_bug.part.0+0x90/0x90 [ 2355.158186] fat_write_begin+0x89/0x180 [ 2355.158504] ? fat_add_cluster+0x100/0x100 [ 2355.158846] generic_perform_write+0x20a/0x4f0 [ 2355.159250] ? fat_direct_IO+0x1ef/0x380 [ 2355.159577] ? page_cache_prev_miss+0x310/0x310 [ 2355.159959] __generic_file_write_iter+0x2cd/0x5d0 [ 2355.160354] generic_file_write_iter+0xdb/0x230 [ 2355.160730] do_iter_readv_writev+0x476/0x750 [ 2355.161090] ? new_sync_write+0x660/0x660 [ 2355.161423] ? avc_policy_seqno+0x9/0x70 [ 2355.161750] ? selinux_file_permission+0x92/0x520 [ 2355.162146] ? security_file_permission+0xb1/0xe0 [ 2355.162539] do_iter_write+0x191/0x700 [ 2355.162853] ? trace_hardirqs_on+0x5b/0x180 [ 2355.163217] vfs_iter_write+0x70/0xa0 [ 2355.163527] iter_file_splice_write+0x762/0xc30 [ 2355.163910] ? generic_splice_sendpage+0x140/0x140 [ 2355.164315] ? security_file_permission+0xb1/0xe0 [ 2355.164705] ? generic_splice_sendpage+0x140/0x140 [ 2355.165099] direct_splice_actor+0x10f/0x170 [ 2355.165453] splice_direct_to_actor+0x387/0x980 [ 2355.165827] ? pipe_to_sendpage+0x380/0x380 [ 2355.166176] ? do_splice_to+0x160/0x160 [ 2355.166497] ? security_file_permission+0xb1/0xe0 [ 2355.166890] do_splice_direct+0x1c4/0x290 [ 2355.167237] ? splice_direct_to_actor+0x980/0x980 [ 2355.167620] ? avc_policy_seqno+0x9/0x70 [ 2355.167953] ? security_file_permission+0xb1/0xe0 [ 2355.168343] do_sendfile+0x553/0x11e0 [ 2355.168660] ? do_pwritev+0x270/0x270 [ 2355.168976] ? wait_for_completion_io+0x270/0x270 [ 2355.169368] ? rcu_read_lock_any_held+0x75/0xa0 [ 2355.169742] ? vfs_write+0x354/0xb10 [ 2355.170051] __x64_sys_sendfile64+0x1d1/0x210 [ 2355.170420] ? __ia32_sys_sendfile+0x220/0x220 [ 2355.170792] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2355.171233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2355.171645] do_syscall_64+0x33/0x40 [ 2355.171946] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2355.172353] RIP: 0033:0x7f9efa275b19 [ 2355.172651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2355.174093] RSP: 002b:00007f9ef77eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2355.174700] RAX: ffffffffffffffda RBX: 00007f9efa388f60 RCX: 00007f9efa275b19 [ 2355.175283] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000004 [ 2355.175832] FAULT_INJECTION: forcing a failure. [ 2355.175832] name failslab, interval 1, probability 0, space 0, times 0 [ 2355.175847] RBP: 00007f9ef77eb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2355.175868] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2355.178017] R13: 00007ffd4750adbf R14: 00007f9ef77eb300 R15: 0000000000022000 [ 2355.178602] CPU: 1 PID: 12407 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2355.179352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2355.180224] Call Trace: [ 2355.180476] dump_stack+0x107/0x167 [ 2355.180817] should_fail.cold+0x5/0xa [ 2355.181188] should_failslab+0x5/0x20 [ 2355.181543] __kmalloc_track_caller+0x79/0x370 [ 2355.181972] ? security_context_to_sid_core+0xb4/0x890 [ 2355.182471] kmemdup_nul+0x2d/0xa0 [ 2355.182802] security_context_to_sid_core+0xb4/0x890 [ 2355.183394] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 2355.183946] ? do_raw_spin_lock+0x121/0x260 [ 2355.184346] ? rwlock_bug.part.0+0x90/0x90 [ 2355.184741] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2355.185196] ? do_raw_spin_unlock+0x4f/0x220 [ 2355.185608] ? _raw_spin_unlock+0x1a/0x30 [ 2355.185998] security_context_to_sid+0x35/0x50 [ 2355.186432] selinux_kernfs_init_security+0x19d/0x4c0 [ 2355.186909] ? selinux_file_mprotect+0x610/0x610 [ 2355.187414] ? find_held_lock+0x2c/0x110 [ 2355.187801] ? __kernfs_new_node+0x2ad/0x860 [ 2355.188206] ? lock_downgrade+0x6d0/0x6d0 [ 2355.188589] ? rwlock_bug.part.0+0x90/0x90 [ 2355.189001] security_kernfs_init_security+0x4e/0xb0 [ 2355.189475] __kernfs_new_node+0x531/0x860 [ 2355.189873] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2355.190315] ? cpumask_next+0x1f/0x30 [ 2355.190672] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2355.191132] ? pcpu_alloc+0x12a/0x1240 [ 2355.191508] kernfs_new_node+0x18d/0x250 [ 2355.191901] kernfs_create_dir_ns+0x49/0x160 [ 2355.192321] cgroup_mkdir+0x318/0xf50 [ 2355.192682] ? cgroup_destroy_locked+0x710/0x710 [ 2355.193130] kernfs_iop_mkdir+0x14d/0x1e0 [ 2355.193517] vfs_mkdir+0x493/0x750 [ 2355.193856] do_mkdirat+0x150/0x2b0 [ 2355.194198] ? user_path_create+0xf0/0xf0 [ 2355.194587] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2355.195098] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2355.195580] do_syscall_64+0x33/0x40 [ 2355.195934] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2355.196409] RIP: 0033:0x7f0c1cebab19 [ 2355.196757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2355.198415] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2355.199143] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2355.199797] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2355.200455] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2355.201104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2355.201748] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2355.243593] cgroup: Unknown subsys name 'perf_event' [ 2355.244538] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:33:47 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 15) 23:33:47 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 21) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:33:47 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000009) 23:33:47 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 23:33:47 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000009) 23:33:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000000a) 23:33:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x10000000d) 23:33:47 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000008) [ 2368.869298] FAULT_INJECTION: forcing a failure. [ 2368.869298] name failslab, interval 1, probability 0, space 0, times 0 [ 2368.872341] CPU: 1 PID: 12451 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2368.874405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2368.876560] Call Trace: [ 2368.877259] dump_stack+0x107/0x167 [ 2368.878190] should_fail.cold+0x5/0xa [ 2368.879180] ? create_object.isra.0+0x3a/0xa20 [ 2368.880301] should_failslab+0x5/0x20 [ 2368.881233] kmem_cache_alloc+0x5b/0x310 [ 2368.882215] create_object.isra.0+0x3a/0xa20 [ 2368.883318] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2368.884559] kmem_cache_alloc+0x159/0x310 [ 2368.885569] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2368.886994] idr_get_free+0x4b5/0x8f0 [ 2368.887989] idr_alloc_u32+0x170/0x2d0 [ 2368.888934] ? __fprop_inc_percpu_max+0x130/0x130 [ 2368.890089] ? lock_acquire+0x197/0x470 [ 2368.891068] ? __kernfs_new_node+0xff/0x860 [ 2368.892140] idr_alloc_cyclic+0x102/0x230 [ 2368.893161] ? idr_alloc+0x130/0x130 [ 2368.894550] ? rwlock_bug.part.0+0x90/0x90 [ 2368.895539] __kernfs_new_node+0x117/0x860 [ 2368.902118] ? mark_held_locks+0x9e/0xe0 [ 2368.903006] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2368.904045] ? cpumask_next+0x1f/0x30 [ 2368.904868] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2368.905877] ? pcpu_alloc+0x12a/0x1240 [ 2368.906733] kernfs_new_node+0x18d/0x250 [ 2368.907627] kernfs_create_dir_ns+0x49/0x160 [ 2368.908586] cgroup_mkdir+0x318/0xf50 [ 2368.909411] ? cgroup_destroy_locked+0x710/0x710 [ 2368.910441] kernfs_iop_mkdir+0x14d/0x1e0 [ 2368.911352] vfs_mkdir+0x493/0x750 [ 2368.912126] do_mkdirat+0x150/0x2b0 [ 2368.912920] ? user_path_create+0xf0/0xf0 [ 2368.913820] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2368.914952] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2368.916081] do_syscall_64+0x33/0x40 [ 2368.916895] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2368.918006] RIP: 0033:0x7f0c1cebab19 [ 2368.918808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2368.922876] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2368.924534] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2368.926104] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2368.927656] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2368.929200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2368.930745] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2368.964830] FAULT_INJECTION: forcing a failure. [ 2368.964830] name failslab, interval 1, probability 0, space 0, times 0 [ 2368.967154] CPU: 0 PID: 12465 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2368.967966] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2368.968824] Call Trace: [ 2368.969108] dump_stack+0x107/0x167 [ 2368.969556] should_fail.cold+0x5/0xa [ 2368.969961] ? create_object.isra.0+0x3a/0xa20 [ 2368.970522] should_failslab+0x5/0x20 [ 2368.970916] kmem_cache_alloc+0x5b/0x310 [ 2368.971430] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2368.971961] create_object.isra.0+0x3a/0xa20 [ 2368.972987] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2368.974162] kmem_cache_alloc+0x159/0x310 [ 2368.975159] ? __kernel_text_address+0x9/0x40 [ 2368.976241] jbd2__journal_start+0x190/0x7e0 [ 2368.977269] __ext4_journal_start_sb+0x214/0x390 [ 2368.978426] ext4_iomap_begin+0x485/0x700 [ 2368.979411] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2368.980553] ? kasan_save_stack+0x1b/0x40 [ 2368.981531] ? ext4_file_write_iter+0xb26/0x18d0 [ 2368.982626] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2368.984111] ? splice_direct_to_actor+0x387/0x980 [ 2368.985244] ? do_splice_direct+0x1c4/0x290 [ 2368.986251] ? do_sendfile+0x553/0x11e0 [ 2368.987144] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2368.988275] ? do_syscall_64+0x33/0x40 [ 2368.989142] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2368.990413] iomap_apply+0x164/0x810 [ 2368.991298] ? iomap_dio_rw+0x90/0x90 [ 2368.992153] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2368.993554] ? mark_held_locks+0x9e/0xe0 [ 2368.994509] ? filemap_check_errors+0xa5/0x150 [ 2368.995571] __iomap_dio_rw+0x6cd/0x1110 [ 2368.996520] ? iomap_dio_rw+0x90/0x90 [ 2368.997445] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2368.998496] ? ext4_orphan_add+0x253/0x9e0 [ 2368.999496] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2369.000628] ? ext4_empty_dir+0xae0/0xae0 [ 2369.001611] ? jbd2__journal_start+0xf3/0x7e0 [ 2369.002659] iomap_dio_rw+0x31/0x90 [ 2369.003538] ext4_file_write_iter+0xb26/0x18d0 [ 2369.004602] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2369.005691] ? kasan_save_stack+0x32/0x40 [ 2369.006657] ? kasan_save_stack+0x1b/0x40 [ 2369.007631] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2369.008803] ? iter_file_splice_write+0x16d/0xc30 [ 2369.009931] ? direct_splice_actor+0x10f/0x170 [ 2369.010976] ? splice_direct_to_actor+0x387/0x980 [ 2369.012081] ? do_splice_direct+0x1c4/0x290 [ 2369.013071] ? do_sendfile+0x553/0x11e0 [ 2369.014032] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2369.015094] ? do_syscall_64+0x33/0x40 [ 2369.016003] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2369.017284] do_iter_readv_writev+0x476/0x750 [ 2369.018347] ? new_sync_write+0x660/0x660 [ 2369.019328] ? avc_policy_seqno+0x9/0x70 [ 2369.020249] ? selinux_file_permission+0x92/0x520 [ 2369.021378] ? security_file_permission+0xb1/0xe0 [ 2369.022513] do_iter_write+0x191/0x700 [ 2369.023430] ? trace_hardirqs_on+0x5b/0x180 [ 2369.024423] vfs_iter_write+0x70/0xa0 [ 2369.025301] iter_file_splice_write+0x762/0xc30 [ 2369.026407] ? generic_splice_sendpage+0x140/0x140 [ 2369.027563] ? security_file_permission+0xb1/0xe0 [ 2369.028681] ? generic_splice_sendpage+0x140/0x140 [ 2369.029799] direct_splice_actor+0x10f/0x170 [ 2369.030834] splice_direct_to_actor+0x387/0x980 [ 2369.031920] ? pipe_to_sendpage+0x380/0x380 [ 2369.032916] ? do_splice_to+0x160/0x160 [ 2369.033838] ? security_file_permission+0xb1/0xe0 [ 2369.034963] do_splice_direct+0x1c4/0x290 [ 2369.035952] ? splice_direct_to_actor+0x980/0x980 [ 2369.037058] ? avc_policy_seqno+0x9/0x70 [ 2369.037998] ? security_file_permission+0xb1/0xe0 [ 2369.039111] do_sendfile+0x553/0x11e0 [ 2369.040035] ? do_pwritev+0x270/0x270 [ 2369.040922] ? wait_for_completion_io+0x270/0x270 [ 2369.042026] ? rcu_read_lock_any_held+0x75/0xa0 [ 2369.043100] ? vfs_write+0x354/0xb10 [ 2369.044006] __x64_sys_sendfile64+0x1d1/0x210 [ 2369.047088] ? __ia32_sys_sendfile+0x220/0x220 [ 2369.048189] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2369.049435] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2369.050625] do_syscall_64+0x33/0x40 [ 2369.051534] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2369.052717] RIP: 0033:0x7f9efa275b19 [ 2369.053576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2369.057842] RSP: 002b:00007f9ef77ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2369.059628] RAX: ffffffffffffffda RBX: 00007f9efa389020 RCX: 00007f9efa275b19 [ 2369.061260] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000006 [ 2369.062880] RBP: 00007f9ef77ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2369.064565] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2369.066164] R13: 00007ffd4750adbf R14: 00007f9ef77ca300 R15: 0000000000022000 [ 2369.071640] cgroup: Unknown subsys name 'perf_event' [ 2369.072789] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:33:47 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 22) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:33:47 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000009) [ 2369.269321] FAULT_INJECTION: forcing a failure. [ 2369.269321] name failslab, interval 1, probability 0, space 0, times 0 [ 2369.272503] CPU: 0 PID: 12472 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2369.274294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2369.276201] Call Trace: [ 2369.276861] dump_stack+0x107/0x167 [ 2369.277772] should_fail.cold+0x5/0xa [ 2369.279414] should_failslab+0x5/0x20 [ 2369.280308] __kmalloc_track_caller+0x79/0x370 [ 2369.281423] ? sidtab_sid2str_get+0x17e/0x720 [ 2369.282494] kmemdup+0x23/0x50 [ 2369.283275] sidtab_sid2str_get+0x17e/0x720 [ 2369.284267] sidtab_entry_to_string+0x33/0x110 [ 2369.285353] security_sid_to_context_core+0x33c/0x5d0 [ 2369.286541] selinux_kernfs_init_security+0x239/0x4c0 [ 2369.287738] ? selinux_file_mprotect+0x610/0x610 [ 2369.288825] ? find_held_lock+0x2c/0x110 [ 2369.289801] ? __kernfs_new_node+0x2ad/0x860 [ 2369.290823] ? rwlock_bug.part.0+0x90/0x90 [ 2369.291839] security_kernfs_init_security+0x4e/0xb0 [ 2369.293007] __kernfs_new_node+0x531/0x860 [ 2369.293992] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2369.295101] ? cpumask_next+0x1f/0x30 [ 2369.296006] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2369.297083] ? pcpu_alloc+0x12a/0x1240 [ 2369.297995] kernfs_new_node+0x18d/0x250 [ 2369.298962] kernfs_create_dir_ns+0x49/0x160 [ 2369.299994] cgroup_mkdir+0x318/0xf50 [ 2369.300887] ? cgroup_destroy_locked+0x710/0x710 [ 2369.301975] kernfs_iop_mkdir+0x14d/0x1e0 [ 2369.302932] vfs_mkdir+0x493/0x750 [ 2369.303794] do_mkdirat+0x150/0x2b0 [ 2369.304639] ? user_path_create+0xf0/0xf0 [ 2369.305614] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2369.306809] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2369.308006] do_syscall_64+0x33/0x40 [ 2369.308898] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2369.310066] RIP: 0033:0x7f0c1cebab19 [ 2369.310932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2369.315203] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2369.316980] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2369.318628] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2369.320299] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2369.321923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2369.323596] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2369.388215] cgroup: Unknown subsys name 'perf_event' [ 2369.390728] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:33:48 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) 23:34:01 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) (fail_nth: 16) 23:34:01 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000a) 23:34:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000000b) 23:34:01 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 23) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:34:01 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000a) 23:34:01 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000000a) 23:34:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x10000000e) 23:34:01 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) [ 2382.670269] FAULT_INJECTION: forcing a failure. [ 2382.670269] name failslab, interval 1, probability 0, space 0, times 0 [ 2382.671311] CPU: 0 PID: 12494 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2382.671897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2382.672592] Call Trace: [ 2382.672826] dump_stack+0x107/0x167 [ 2382.673139] should_fail.cold+0x5/0xa [ 2382.673470] ? ___slab_alloc+0x155/0x700 [ 2382.673818] ? create_object.isra.0+0x3a/0xa20 [ 2382.674214] should_failslab+0x5/0x20 [ 2382.674540] kmem_cache_alloc+0x5b/0x310 [ 2382.674891] create_object.isra.0+0x3a/0xa20 [ 2382.675268] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2382.675720] kmem_cache_alloc+0x159/0x310 [ 2382.676084] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2382.676562] idr_get_free+0x4b5/0x8f0 [ 2382.676898] idr_alloc_u32+0x170/0x2d0 [ 2382.677235] ? __fprop_inc_percpu_max+0x130/0x130 [ 2382.677656] ? lock_acquire+0x197/0x470 [ 2382.678000] ? __kernfs_new_node+0xff/0x860 [ 2382.678372] idr_alloc_cyclic+0x102/0x230 [ 2382.678726] ? idr_alloc+0x130/0x130 [ 2382.679046] ? rwlock_bug.part.0+0x90/0x90 [ 2382.679438] __kernfs_new_node+0x117/0x860 [ 2382.679800] ? mark_held_locks+0x9e/0xe0 [ 2382.680152] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2382.680558] ? cpumask_next+0x1f/0x30 [ 2382.680887] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2382.681287] ? pcpu_alloc+0x12a/0x1240 [ 2382.681629] kernfs_new_node+0x18d/0x250 [ 2382.681983] kernfs_create_dir_ns+0x49/0x160 [ 2382.682368] cgroup_mkdir+0x318/0xf50 [ 2382.682700] ? cgroup_destroy_locked+0x710/0x710 [ 2382.683106] kernfs_iop_mkdir+0x14d/0x1e0 [ 2382.699503] vfs_mkdir+0x493/0x750 [ 2382.699810] do_mkdirat+0x150/0x2b0 [ 2382.700119] ? user_path_create+0xf0/0xf0 [ 2382.700473] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2382.700913] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2382.701348] do_syscall_64+0x33/0x40 [ 2382.701662] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2382.702092] RIP: 0033:0x7f0c1cebab19 [ 2382.702408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2382.703959] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2382.704598] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2382.705194] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2382.705789] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2382.706382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2382.706976] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2382.711018] FAULT_INJECTION: forcing a failure. [ 2382.711018] name failslab, interval 1, probability 0, space 0, times 0 [ 2382.712235] CPU: 0 PID: 12509 Comm: syz-executor.6 Not tainted 5.10.224 #1 [ 2382.712817] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2382.713512] Call Trace: [ 2382.713743] dump_stack+0x107/0x167 [ 2382.714056] should_fail.cold+0x5/0xa [ 2382.714384] ? create_object.isra.0+0x3a/0xa20 [ 2382.714785] should_failslab+0x5/0x20 [ 2382.715116] kmem_cache_alloc+0x5b/0x310 [ 2382.731540] create_object.isra.0+0x3a/0xa20 [ 2382.731975] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2382.732451] kmem_cache_alloc+0x159/0x310 [ 2382.732853] __es_insert_extent+0xed1/0x1370 [ 2382.733278] ? do_raw_read_unlock+0x70/0x70 [ 2382.733690] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2382.734193] ext4_es_insert_extent+0x45d/0xf10 [ 2382.734627] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2382.735036] ? ext4_es_find_extent_range+0x1cb/0x460 [ 2382.735521] ? lock_downgrade+0x6d0/0x6d0 [ 2382.735931] ? __ext4_handle_dirty_super+0x100/0x100 [ 2382.736425] ? __es_find_extent_range+0x197/0x4b0 [ 2382.736892] ? do_raw_read_unlock+0x3b/0x70 [ 2382.737299] ext4_ext_map_blocks+0x1863/0x5830 [ 2382.737744] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2382.738238] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2382.738737] ? ext4_ext_release+0x10/0x10 [ 2382.739136] ? lock_release+0x680/0x680 [ 2382.739561] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 2382.740004] ? lock_downgrade+0x6d0/0x6d0 [ 2382.740413] ? down_read+0x10f/0x430 [ 2382.740767] ? down_write+0x160/0x160 [ 2382.741125] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 2382.741583] ext4_map_blocks+0x8e1/0x1910 [ 2382.741986] ? kmem_cache_alloc+0x2a6/0x310 [ 2382.742399] ? __kernel_text_address+0x9/0x40 [ 2382.742827] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2382.743245] ? jbd2__journal_start+0xf3/0x7e0 [ 2382.743691] ? __ext4_journal_start_sb+0x214/0x390 [ 2382.744154] ? __ext4_journal_start_sb+0x1db/0x390 [ 2382.744620] ext4_iomap_begin+0x3ad/0x700 [ 2382.745019] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2382.745474] ? kasan_save_stack+0x1b/0x40 [ 2382.745865] ? ext4_file_write_iter+0xb26/0x18d0 [ 2382.746315] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2382.746914] ? splice_direct_to_actor+0x387/0x980 [ 2382.747392] ? do_splice_direct+0x1c4/0x290 [ 2382.747801] ? do_sendfile+0x553/0x11e0 [ 2382.748177] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2382.748620] ? do_syscall_64+0x33/0x40 [ 2382.748987] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2382.749495] iomap_apply+0x164/0x810 [ 2382.749860] ? iomap_dio_rw+0x90/0x90 [ 2382.750224] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2382.750778] ? mark_held_locks+0x9e/0xe0 [ 2382.751178] ? filemap_check_errors+0xa5/0x150 [ 2382.751634] __iomap_dio_rw+0x6cd/0x1110 [ 2382.752015] ? iomap_dio_rw+0x90/0x90 [ 2382.752393] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2382.752840] ? ext4_orphan_add+0x253/0x9e0 [ 2382.753234] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2382.753706] ? ext4_empty_dir+0xae0/0xae0 [ 2382.754095] ? jbd2__journal_start+0xf3/0x7e0 [ 2382.754532] iomap_dio_rw+0x31/0x90 [ 2382.754886] ext4_file_write_iter+0xb26/0x18d0 [ 2382.755341] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2382.755785] ? kasan_save_stack+0x32/0x40 [ 2382.756179] ? kasan_save_stack+0x1b/0x40 [ 2382.756566] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2382.757043] ? iter_file_splice_write+0x16d/0xc30 [ 2382.757490] ? direct_splice_actor+0x10f/0x170 [ 2382.757925] ? splice_direct_to_actor+0x387/0x980 [ 2382.758383] ? do_splice_direct+0x1c4/0x290 [ 2382.758794] ? do_sendfile+0x553/0x11e0 [ 2382.759164] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2382.759615] ? do_syscall_64+0x33/0x40 [ 2382.759979] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2382.760480] do_iter_readv_writev+0x476/0x750 [ 2382.760899] ? new_sync_write+0x660/0x660 [ 2382.761293] ? avc_policy_seqno+0x9/0x70 [ 2382.761678] ? selinux_file_permission+0x92/0x520 [ 2382.762147] ? security_file_permission+0xb1/0xe0 [ 2382.762612] do_iter_write+0x191/0x700 [ 2382.762980] ? trace_hardirqs_on+0x5b/0x180 [ 2382.763395] vfs_iter_write+0x70/0xa0 [ 2382.763774] iter_file_splice_write+0x762/0xc30 [ 2382.764218] ? generic_splice_sendpage+0x140/0x140 [ 2382.764699] ? security_file_permission+0xb1/0xe0 [ 2382.765147] ? generic_splice_sendpage+0x140/0x140 [ 2382.765609] direct_splice_actor+0x10f/0x170 [ 2382.766023] splice_direct_to_actor+0x387/0x980 [ 2382.766455] ? pipe_to_sendpage+0x380/0x380 [ 2382.766857] ? do_splice_to+0x160/0x160 [ 2382.767229] ? security_file_permission+0xb1/0xe0 [ 2382.767695] do_splice_direct+0x1c4/0x290 [ 2382.768082] ? splice_direct_to_actor+0x980/0x980 [ 2382.768528] ? avc_policy_seqno+0x9/0x70 [ 2382.768917] ? security_file_permission+0xb1/0xe0 [ 2382.769372] do_sendfile+0x553/0x11e0 [ 2382.769743] ? do_pwritev+0x270/0x270 [ 2382.770102] ? wait_for_completion_io+0x270/0x270 [ 2382.770566] ? rcu_read_lock_any_held+0x75/0xa0 [ 2382.770999] ? vfs_write+0x354/0xb10 [ 2382.771372] __x64_sys_sendfile64+0x1d1/0x210 [ 2382.771806] ? __ia32_sys_sendfile+0x220/0x220 [ 2382.772245] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2382.772735] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2382.773211] do_syscall_64+0x33/0x40 [ 2382.773561] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2382.774035] RIP: 0033:0x7f9efa275b19 [ 2382.774380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2382.776057] RSP: 002b:00007f9ef77ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2382.776757] RAX: ffffffffffffffda RBX: 00007f9efa389020 RCX: 00007f9efa275b19 [ 2382.777372] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000006 [ 2382.778005] RBP: 00007f9ef77ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2382.778658] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2382.779306] R13: 00007ffd4750adbf R14: 00007f9ef77ca300 R15: 0000000000022000 23:34:01 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) [ 2382.844666] cgroup: Unknown subsys name 'perf_event' 23:34:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x10000000f) [ 2382.893101] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:34:01 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 24) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:34:01 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000b) 23:34:01 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000b) 23:34:01 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 23:34:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000010) [ 2383.137624] FAULT_INJECTION: forcing a failure. [ 2383.137624] name failslab, interval 1, probability 0, space 0, times 0 [ 2383.139299] CPU: 1 PID: 12535 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2383.140077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2383.140934] Call Trace: [ 2383.141184] dump_stack+0x107/0x167 [ 2383.141618] should_fail.cold+0x5/0xa [ 2383.142026] ? __kernfs_iattrs+0xbc/0x470 [ 2383.142466] should_failslab+0x5/0x20 [ 2383.142822] kmem_cache_alloc+0x5b/0x310 [ 2383.143304] __kernfs_iattrs+0xbc/0x470 [ 2383.143647] kernfs_xattr_set+0x2b/0x80 [ 2383.144023] selinux_kernfs_init_security+0x26d/0x4c0 [ 2383.144558] ? selinux_file_mprotect+0x610/0x610 [ 2383.145021] ? find_held_lock+0x2c/0x110 [ 2383.145484] ? __kernfs_new_node+0x2ad/0x860 [ 2383.145925] ? rwlock_bug.part.0+0x90/0x90 [ 2383.146390] security_kernfs_init_security+0x4e/0xb0 [ 2383.146877] __kernfs_new_node+0x531/0x860 [ 2383.147385] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2383.147844] ? cpumask_next+0x1f/0x30 [ 2383.148265] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2383.148698] ? pcpu_alloc+0x12a/0x1240 [ 2383.149089] kernfs_new_node+0x18d/0x250 [ 2383.149553] kernfs_create_dir_ns+0x49/0x160 [ 2383.149992] cgroup_mkdir+0x318/0xf50 [ 2383.150416] ? cgroup_destroy_locked+0x710/0x710 [ 2383.150857] kernfs_iop_mkdir+0x14d/0x1e0 [ 2383.151318] vfs_mkdir+0x493/0x750 [ 2383.151662] do_mkdirat+0x150/0x2b0 [ 2383.151969] ? user_path_create+0xf0/0xf0 [ 2383.152316] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2383.152715] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2383.153130] do_syscall_64+0x33/0x40 [ 2383.153435] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2383.153825] RIP: 0033:0x7f0c1cebab19 [ 2383.154129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2383.155566] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2383.156165] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2383.156715] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2383.157291] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2383.157829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2383.158402] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2383.164460] cgroup: Unknown subsys name 'perf_event' [ 2383.166791] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:34:01 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 25) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) [ 2383.393830] FAULT_INJECTION: forcing a failure. [ 2383.393830] name failslab, interval 1, probability 0, space 0, times 0 [ 2383.395149] CPU: 1 PID: 12544 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2383.395854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2383.396635] Call Trace: [ 2383.396918] dump_stack+0x107/0x167 [ 2383.397301] should_fail.cold+0x5/0xa [ 2383.397656] ? create_object.isra.0+0x3a/0xa20 [ 2383.398100] should_failslab+0x5/0x20 [ 2383.398494] kmem_cache_alloc+0x5b/0x310 [ 2383.398877] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2383.399430] create_object.isra.0+0x3a/0xa20 [ 2383.399830] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2383.400357] __kmalloc+0x16e/0x390 [ 2383.400699] selinux_kernfs_init_security+0x137/0x4c0 [ 2383.401187] ? selinux_file_mprotect+0x610/0x610 [ 2383.401662] ? find_held_lock+0x2c/0x110 [ 2383.402055] ? __kernfs_new_node+0x2ad/0x860 [ 2383.402527] ? lock_downgrade+0x6d0/0x6d0 [ 2383.402935] ? rwlock_bug.part.0+0x90/0x90 [ 2383.403447] security_kernfs_init_security+0x4e/0xb0 [ 2383.403921] __kernfs_new_node+0x531/0x860 [ 2383.404395] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2383.404822] ? cpumask_next+0x1f/0x30 [ 2383.405191] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2383.405669] ? pcpu_alloc+0x12a/0x1240 [ 2383.406053] kernfs_new_node+0x18d/0x250 [ 2383.406484] kernfs_create_dir_ns+0x49/0x160 [ 2383.406900] cgroup_mkdir+0x318/0xf50 [ 2383.407355] ? cgroup_destroy_locked+0x710/0x710 [ 2383.407795] kernfs_iop_mkdir+0x14d/0x1e0 [ 2383.408192] vfs_mkdir+0x493/0x750 [ 2383.408577] do_mkdirat+0x150/0x2b0 [ 2383.408926] ? user_path_create+0xf0/0xf0 [ 2383.409359] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2383.409847] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2383.410376] do_syscall_64+0x33/0x40 [ 2383.410731] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2383.411249] RIP: 0033:0x7f0c1cebab19 [ 2383.411615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2383.413417] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2383.414131] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2383.414823] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2383.415566] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2383.416307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2383.416978] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2383.427497] cgroup: Unknown subsys name 'perf_event' [ 2383.433762] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:34:01 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:34:01 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 23:34:15 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 26) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:34:15 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000c) 23:34:15 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000c) 23:34:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000000c) 23:34:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000011) 23:34:15 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000000b) 23:34:15 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000002) 23:34:15 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) [ 2397.153229] FAULT_INJECTION: forcing a failure. [ 2397.153229] name failslab, interval 1, probability 0, space 0, times 0 [ 2397.154259] CPU: 1 PID: 12569 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2397.154844] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2397.155550] Call Trace: [ 2397.155792] dump_stack+0x107/0x167 [ 2397.156105] should_fail.cold+0x5/0xa [ 2397.156439] ? kvmalloc_node+0x119/0x170 [ 2397.156792] should_failslab+0x5/0x20 [ 2397.157120] __kmalloc_node+0x76/0x420 [ 2397.157478] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2397.157917] kvmalloc_node+0x119/0x170 [ 2397.158276] simple_xattr_alloc+0x43/0xa0 [ 2397.158631] simple_xattr_set+0x75/0x610 [ 2397.158989] kernfs_xattr_set+0x50/0x80 [ 2397.159337] selinux_kernfs_init_security+0x26d/0x4c0 [ 2397.159784] ? selinux_file_mprotect+0x610/0x610 [ 2397.160190] ? find_held_lock+0x2c/0x110 [ 2397.160560] ? __kernfs_new_node+0x2ad/0x860 [ 2397.160959] ? rwlock_bug.part.0+0x90/0x90 [ 2397.161348] security_kernfs_init_security+0x4e/0xb0 [ 2397.161804] __kernfs_new_node+0x531/0x860 [ 2397.162195] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2397.162623] ? cpumask_next+0x1f/0x30 [ 2397.162969] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2397.163390] ? pcpu_alloc+0x12a/0x1240 [ 2397.163747] kernfs_new_node+0x18d/0x250 [ 2397.164102] kernfs_create_dir_ns+0x49/0x160 [ 2397.164483] cgroup_mkdir+0x318/0xf50 [ 2397.164815] ? cgroup_destroy_locked+0x710/0x710 [ 2397.165224] kernfs_iop_mkdir+0x14d/0x1e0 [ 2397.165579] vfs_mkdir+0x493/0x750 [ 2397.165892] do_mkdirat+0x150/0x2b0 [ 2397.166206] ? user_path_create+0xf0/0xf0 [ 2397.166564] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2397.167011] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2397.167450] do_syscall_64+0x33/0x40 [ 2397.167794] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2397.168229] RIP: 0033:0x7f0c1cebab19 [ 2397.168544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2397.170070] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2397.170707] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2397.171302] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2397.171924] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2397.172522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2397.173122] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2397.192824] cgroup: Unknown subsys name 'perf_event' [ 2397.193778] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:34:15 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) 23:34:15 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 27) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:34:15 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendfile(r2, r3, 0x0, 0x100000003) 23:34:15 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) [ 2397.439376] FAULT_INJECTION: forcing a failure. [ 2397.439376] name failslab, interval 1, probability 0, space 0, times 0 [ 2397.440570] CPU: 1 PID: 12593 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2397.441187] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2397.441914] Call Trace: [ 2397.442168] dump_stack+0x107/0x167 [ 2397.442509] should_fail.cold+0x5/0xa [ 2397.442852] ? create_object.isra.0+0x3a/0xa20 [ 2397.443251] should_failslab+0x5/0x20 [ 2397.443626] kmem_cache_alloc+0x5b/0x310 [ 2397.443984] create_object.isra.0+0x3a/0xa20 [ 2397.444373] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2397.444819] __kmalloc_track_caller+0x177/0x370 [ 2397.445224] ? security_context_to_sid_core+0xb4/0x890 [ 2397.445688] kmemdup_nul+0x2d/0xa0 [ 2397.445999] security_context_to_sid_core+0xb4/0x890 [ 2397.446444] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 2397.446919] ? do_raw_spin_lock+0x121/0x260 [ 2397.447301] ? rwlock_bug.part.0+0x90/0x90 [ 2397.447925] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2397.448346] ? do_raw_spin_unlock+0x4f/0x220 [ 2397.448727] ? _raw_spin_unlock+0x1a/0x30 [ 2397.449090] security_context_to_sid+0x35/0x50 [ 2397.449494] selinux_kernfs_init_security+0x19d/0x4c0 [ 2397.449940] ? selinux_file_mprotect+0x610/0x610 [ 2397.450348] ? find_held_lock+0x2c/0x110 [ 2397.450710] ? __kernfs_new_node+0x2ad/0x860 [ 2397.451093] ? lock_downgrade+0x6d0/0x6d0 [ 2397.451455] ? rwlock_bug.part.0+0x90/0x90 [ 2397.451884] security_kernfs_init_security+0x4e/0xb0 [ 2397.452327] __kernfs_new_node+0x531/0x860 [ 2397.452699] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2397.453113] ? cpumask_next+0x1f/0x30 [ 2397.453444] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2397.453848] ? pcpu_alloc+0x12a/0x1240 [ 2397.454196] kernfs_new_node+0x18d/0x250 [ 2397.454554] kernfs_create_dir_ns+0x49/0x160 [ 2397.454940] cgroup_mkdir+0x318/0xf50 [ 2397.455276] ? cgroup_destroy_locked+0x710/0x710 [ 2397.455713] kernfs_iop_mkdir+0x14d/0x1e0 [ 2397.456075] vfs_mkdir+0x493/0x750 [ 2397.456386] do_mkdirat+0x150/0x2b0 [ 2397.456705] ? user_path_create+0xf0/0xf0 [ 2397.457069] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2397.457523] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2397.457969] do_syscall_64+0x33/0x40 [ 2397.458293] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2397.458734] RIP: 0033:0x7f0c1cebab19 [ 2397.459058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2397.460717] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2397.461370] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2397.461978] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2397.462594] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2397.463204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2397.463851] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 23:34:15 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000d) 23:34:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000000d) 23:34:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) sendfile(r1, r2, 0x0, 0x100000112) [ 2397.480406] cgroup: Unknown subsys name 'perf_event' [ 2397.482158] tmpfs: Unknown parameter 'ÿÿÿÿ' 23:34:16 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) rmdir(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000000c) 23:34:16 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000400)=""/196) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000d) 23:34:16 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x8) lseek(r1, 0xfa2b, 0x3) umount2(&(0x7f0000000300)='./file1\x00', 0x4) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 28) mount$cgroup(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000480), 0x201840c, &(0x7f0000000500)={[{@xattr}, {@subsystem='perf_event'}, {}, {@none}], [{@fowner_gt}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '})%{\xf4,'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fowner_lt={'fowner<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000280)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64=r3]) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000400)={@dev, @empty}, &(0x7f0000000440)=0xc) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r4, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 23:34:16 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x0, 0xffffff7f}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) [ 2397.712255] FAULT_INJECTION: forcing a failure. [ 2397.712255] name failslab, interval 1, probability 0, space 0, times 0 [ 2397.713314] CPU: 1 PID: 12620 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 2397.713899] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2397.714593] Call Trace: [ 2397.714826] dump_stack+0x107/0x167 [ 2397.715140] should_fail.cold+0x5/0xa [ 2397.715485] should_failslab+0x5/0x20 [ 2397.715826] __kmalloc_track_caller+0x79/0x370 [ 2397.716222] ? sidtab_sid2str_get+0x17e/0x720 [ 2397.716615] kmemdup+0x23/0x50 [ 2397.716894] sidtab_sid2str_get+0x17e/0x720 [ 2397.717267] sidtab_entry_to_string+0x33/0x110 [ 2397.717661] security_sid_to_context_core+0x33c/0x5d0 [ 2397.718108] selinux_kernfs_init_security+0x239/0x4c0 [ 2397.718548] ? selinux_file_mprotect+0x610/0x610 [ 2397.718955] ? trace_hardirqs_on+0x5b/0x180 [ 2397.719327] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2397.719818] security_kernfs_init_security+0x4e/0xb0 [ 2397.720255] __kernfs_new_node+0x531/0x860 [ 2397.720622] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2397.721029] ? cpumask_next+0x1f/0x30 [ 2397.721357] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2397.721755] ? pcpu_alloc+0x12a/0x1240 [ 2397.722099] kernfs_new_node+0x18d/0x250 [ 2397.722454] kernfs_create_dir_ns+0x49/0x160 [ 2397.722836] cgroup_mkdir+0x318/0xf50 [ 2397.723168] ? cgroup_destroy_locked+0x710/0x710 [ 2397.723590] kernfs_iop_mkdir+0x14d/0x1e0 [ 2397.723946] vfs_mkdir+0x493/0x750 [ 2397.724254] do_mkdirat+0x150/0x2b0 [ 2397.724567] ? user_path_create+0xf0/0xf0 [ 2397.724933] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2397.725376] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2397.725816] do_syscall_64+0x33/0x40 [ 2397.726135] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2397.726568] RIP: 0033:0x7f0c1cebab19 [ 2397.726886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2397.728442] RSP: 002b:00007f0c1a430188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2397.729087] RAX: ffffffffffffffda RBX: 00007f0c1cfcdf60 RCX: 00007f0c1cebab19 [ 2397.729687] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2397.730288] RBP: 00007f0c1a4301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2397.730888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2397.731497] R13: 00007ffe885e543f R14: 00007f0c1a430300 R15: 0000000000022000 [ 2397.789095] cgroup: Unknown subsys name 'perf_event' [ 2397.794620] tmpfs: Unknown parameter 'ÿÿÿÿ' [ 2410.913501] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8880194b0750 (size 144): comm "syz-executor.1", pid 12569, jiffies 4297064168 (age 20.966s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 f7 6d ca 66 00 00 00 00 .........m.f.... 1e bf 2f 27 00 00 00 00 f7 6d ca 66 00 00 00 00 ../'.....m.f.... backtrace: [<00000000fe5637f5>] __kernfs_iattrs+0xbc/0x470 [<00000000d33bbccd>] kernfs_xattr_set+0x2b/0x80 [<00000000b19841a9>] selinux_kernfs_init_security+0x26d/0x4c0 [<00000000cb09104e>] security_kernfs_init_security+0x4e/0xb0 [<000000001a061f8c>] __kernfs_new_node+0x531/0x860 [<000000006681fcaf>] kernfs_new_node+0x18d/0x250 [<00000000e712fc7a>] kernfs_create_dir_ns+0x49/0x160 [<0000000080d1158d>] cgroup_mkdir+0x318/0xf50 [<000000001a1e1f82>] kernfs_iop_mkdir+0x14d/0x1e0 [<00000000caf7bb0c>] vfs_mkdir+0x493/0x750 [<0000000017ed03e3>] do_mkdirat+0x150/0x2b0 [<0000000051206286>] do_syscall_64+0x33/0x40 [<00000000e814a195>] entry_SYSCALL_64_after_hwframe+0x67/0xd1 BUG: leak checking failed VM DIAGNOSIS: 23:34:37 Registers: info registers vcpu 0 RAX=ffffffff83e77220 RBX=0000000000000000 RCX=ffffffff83e5f01c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e77828 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85675f88 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7722e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffca8280de8 CR3=000000001ad5c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=0a64656c69616620676e696b63656863 XMM02=31636e75662e6e75522e6c697475736f XMM03=00000000000000000000000000000000 XMM04=6b61656c2079726f6d656d203a475542 XMM05=202020200a30623278302f3035317830 XMM06=32363032313530303030303030303c5b XMM07=5f6c6c61637379735f6f64205d3e3638 XMM08=2020200a303478302f333378302b3436 XMM09=613431386530303030303030303c5b20 XMM10=435359535f7972746e65205d3e353931 XMM11=6677685f72657466615f34365f4c4c41 XMM12=0a0a316478302f373678302b656d6172 XMM13=0c73746e696820636578650a00656761 XMM14=65786511146c61746f7420636578650a XMM15=0000737472617473657220726f747563 info registers vcpu 1 RAX=ffffffff83e77220 RBX=0000000000000001 RCX=ffffffff83e5f01c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e77828 RBP=ffffed1001130000 RSP=ffff88800898fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85675f88 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7722e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f7ffafc1ed8 CR3=000000001ad5c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000416be7fa00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000