_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x74, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x168, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x120, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xff}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x58ac}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x81}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x400}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}]}, @NL80211_PMSR_TYPE_FTM={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xfa}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1a0}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x26}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x16}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}]}, {0x204, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x10, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x4c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x144, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x9c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x401}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7ff}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xb8f2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x74, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x56}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1b}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1e3}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1289}]}]}, {0x364, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3cd}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2c}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x1f0, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xe4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x400}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xe8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2e}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xec}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xe9}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x44b}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x91}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0xbc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xa8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x40}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xd}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3b}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x3c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x36}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0xc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x26}]}]}, {0x54, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x37}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}]}, @NL80211_PMSR_ATTR_PEERS={0x128c, 0x5, 0x0, 0x1, [{0x188, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x10, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x1c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x101}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x34, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1d}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x118, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xa8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xeb}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x72}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x5c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}]}]}]}, {0x258, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x224, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xa8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x114, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x800}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x101}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1e}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7517}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xff89}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x54, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x18}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x20}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}, {0x558, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x374, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x90, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x18}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x60, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xec, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfc3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x8029eb092e896226}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7ff}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff9}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x700}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x40}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x44, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1f3}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xa}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xa}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2eb}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x160, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x200}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xff}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x18}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8c}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x54, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x3a4, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x1ac, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xdc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe244}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1000}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x48}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x20}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x33}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xab}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xc4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x134, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x50, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x84, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfca}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x34, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1699}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x9}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xc}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x6}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x10000}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x239}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x20, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x70, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x3}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xa55}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xfffffffc}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x37}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x6}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x22}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x3}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x52c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x1b8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1e}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x64, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x81}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x330, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xfc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8d}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfffc}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x54, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x31d3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xb3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6422}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9c}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x5c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x20}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xa2}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x10001}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x10, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1b}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0xe20, 0x5, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xff}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x79404cf2c46fc9a8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x158, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x192}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xe0, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x84, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x400}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xff}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3c}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x88, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0xa20}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16d5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x15cc}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x3ff}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3a5}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x28, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}]}]}]}]}, {0x27c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x3a7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x22}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3c}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x200}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x1d0, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x1b8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1e}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x54, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7fff}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x33}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xff}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8001}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x5c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x50, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x100}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6db4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x1e0, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x104, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x6c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x93}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x81}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x101}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x60, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x89}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x80, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x74, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x21}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7ff}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x329}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x6}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x400}]}]}, {0x250, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x104, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x100, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3ff}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x40}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x114, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x10c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1ff}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x34, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1608}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3c}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x33b}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1e5}]}]}, {0x564, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x18c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xc0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xe000}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x89}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x18}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x384, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xe4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xd43b}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xea}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xbc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x996}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfc00}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xf4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x80, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x90, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xa87b}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xed}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x16d}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1e}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x6}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x26}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}]}]}]}]}, 0x67c4}, 0x1, 0x0, 0x0, 0x4}, 0x8000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r7, 0x0, r4, 0x0, 0x200f5ef, 0x0) dup3(r0, r4, 0x0) 01:45:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x199, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:45:53 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5418, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:45:53 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, 0x0, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:45:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x300, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:45:53 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5419, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:45:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:45:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) 01:45:53 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x541a, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1315.503033] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:45:54 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:45:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x302, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:45:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 01:45:54 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x541b, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:45:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000100), 0x100000000, 0x12100) setns(r1, 0x14020080) syz_genetlink_get_family_id$SEG6(&(0x7f0000000540), r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000600), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0), 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x40, r2, 0x222, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x4d35}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x401}, @BATADV_ATTR_HOP_PENALTY={0x5}]}, 0x40}}, 0x8000) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xfffffffc}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x800}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xce}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x20000080) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 01:45:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0xb00, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:45:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) [ 1315.714023] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1315.717577] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:46:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 01:46:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0xc00, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:46:12 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x541c, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:46:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x5c, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x40, 0x400000}]}, 0x10) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x42800) bind$802154_raw(r1, &(0x7f0000000040)={0x24, @short={0x2, 0x3}}, 0x14) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000100)=""/107, 0x6b}, {&(0x7f0000000180)=""/244, 0xf4}, {&(0x7f0000000080)}, {&(0x7f00000002c0)=""/95, 0x5f}, {&(0x7f0000000340)=""/81, 0x51}, {&(0x7f00000003c0)=""/54, 0x36}, {&(0x7f0000000400)=""/43, 0x2b}, {&(0x7f0000000440)=""/37, 0x25}], 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 01:46:12 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:46:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x382, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:46:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:46:12 executing program 0: syz_io_uring_complete(0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) r1 = syz_io_uring_setup(0x5460, &(0x7f0000000080)={0x0, 0xeaea, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000280)) r2 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) syz_io_uring_setup(0x635, &(0x7f0000000000)={0x0, 0xc42, 0x20, 0x3, 0x331, 0x0, r1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r6, &(0x7f0000000200)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x200) [ 1334.194636] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1334.232905] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:46:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0xd00, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:46:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44, 0x0, 0x0, 0x3}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000040)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 01:46:12 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x541d, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:46:26 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1347.505060] audit: type=1400 audit(1729734386.035:42): avc: denied { create } for pid=8602 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 01:46:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 01:46:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:46:26 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000000)="bf9cf3e1bec1ebb422dc1757fb42bf628730725a8598804f", 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r1) 01:46:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x382, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:46:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='.\x00', 0x2000003) r1 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0)={0x0, 0xfffffffe}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x20001, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd=r4}, 0x0) ioctl$FIOCLEX(r4, 0x5451) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x0, 0x5}}, './file0\x00'}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f00000000c0)) inotify_rm_watch(0xffffffffffffffff, 0x0) close(r4) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 01:46:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0xe00, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:46:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x541e, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:46:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0xf00, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:46:26 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:46:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x541e, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1347.577847] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1347.580870] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:46:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}) 01:46:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:46:39 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0xc39, 0xa6219d3}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x6, 0x4, 0x4, 0x0, 0x0, 0x1f, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xf3f, 0x7ff}, 0x840, 0x6, 0x1000, 0x9, 0x3, 0xffffffff, 0x453, 0x0, 0xa8b, 0x0, 0x9}, 0xffffffffffffffff, 0xd, r0, 0x8) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc69de45660031e8d}, {@in=@empty, 0x0, 0x32}, @in=@multicast1, {}, {}, {0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x80, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x8}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r4 = socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$NL80211_CMD_GET_KEY(r4, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x6, 0x4e}}}}, [@NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_MAC={0xa}]}, 0x58}, 0x1, 0x0, 0x0, 0xc4}, 0xc040) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0xa}, {0xffffffffffffffff, 0x8003}, {r0, 0x2000}], 0x3, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x6]}, 0x8) msgget$private(0x0, 0x8c) 01:46:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:46:39 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fsmount(0xffffffffffffffff, 0x0, 0xfe) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000040)=0x3, 0x4) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r0, 0x400, 0x70bd26, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x2, 0x54}}}}, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}]}, 0x30}}, 0x44005) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r3, 0xb99771294b5ad721}, 0x14}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="0002000000002e2f64696c6530002d65570d5315836f6e5523abcdd5696ad3c62293e53b6a6c455cbd1eb3522e"]) fcntl$dupfd(r1, 0x0, r4) 01:46:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}) 01:46:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x382, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:46:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1100, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:46:39 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5421, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:46:39 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1360.916142] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1360.923943] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:46:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1200, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:46:39 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5422, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:46:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0500000000002e2f66696c6530003f955c6436ad729804e4a5f7a314ee50213a044b4b191fed9e0d9717b95874ee83f1ffe81c27213bc30863f933fb29ebd8010fedbadf85365fc6f8348d62fd2b11ce972d796f6a6e7def1777ac78a1f381e02a0dc41cb5b7"]) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 01:46:39 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:46:39 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5423, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:46:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:46:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}) 01:46:39 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x20) socket$inet_tcp(0x2, 0x1, 0x0) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f0000000380)={0x0, 0x8, &(0x7f0000000340)={&(0x7f0000000300)={0x3, 0x7, 0x1, 0x101, 0x0, 0x0, {}, ["", "", ""]}, 0x14}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) sendmsg$NFULNL_MSG_CONFIG(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x1, 0x4, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x8}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xf9dc}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10000001}, 0x8000) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) r5 = dup2(r2, r3) ioctl$AUTOFS_DEV_IOCTL_VERSION(r5, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r7 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) sendfile(r6, r7, &(0x7f0000000080)=0x514, 0x257b) 01:46:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:46:39 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5424, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:46:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:46:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4814}, 0x4000, 0x0, 0x0, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, r0, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000200), &(0x7f00000002c0)=@v2={0x2000000, [{0x1ff, 0x6}, {0x1, 0xa91}]}, 0x14, 0x1) syz_io_uring_complete(r2) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2, 0x0, 0x0, 0x0, 0x23456}, 0x4) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a80)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd=r4, 0x4b42, 0x0, 0x4, 0x2, 0x0, {0x0, r5}}, 0x90) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd=r6, 0xffffffffffff56c0, 0x0, 0x1f}, 0x2) creat(&(0x7f0000000100)='./file0\x00', 0x32) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x30, r0, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000001c0)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd_index=0x7, 0x5, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x90000, 0x100) 01:46:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="21d72bbd7000000000000a000000ec127fe0672113bfebbf5f15ba198f682a22d8564fb806fbfc7f552b20b1457ad7ba508b2b7e5f00dc"], 0x14}}, 0x40804) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x44}, {0x6, 0x0, 0x8, 0x400000}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 01:46:52 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:46:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:46:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:46:52 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5425, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:46:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1300, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:46:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x66515, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:46:52 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5427, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:46:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:46:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x600, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x3, 0x1}}}}}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x40c0) [ 1374.257748] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1374.263028] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:46:52 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xf, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0xc0189436, &(0x7f0000000080)) open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x40) 01:46:52 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:46:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:47:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:47:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:47:05 executing program 0: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000001500)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, 0x1010, r2, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000140)=@IORING_OP_OPENAT2={0x1c, 0x5, 0x0, r2, &(0x7f0000000080)={0xa142, 0xc, 0x2}, &(0x7f00000000c0)='./file1\x00', 0x18, 0x0, 0x23456}, 0x6) sendfile(r1, r2, 0x0, 0x10000000c) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x9, 0x1f, 0x7ff, 0x2, 0x7fffffff}) r4 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_setup(0x33fe, &(0x7f0000000180)={0x0, 0xf07, 0x4, 0x1, 0x26b, 0x0, r1}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r8, &(0x7f00000002c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r9}}, 0x4) 01:47:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:47:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(0x0, 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:47:05 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:47:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xea24, 0x40, 0x17, 0x6}, {0x1000, 0x1, 0x2, 0x1f}]}, 0x10) connect$bt_sco(r1, &(0x7f0000000100)={0x1f, @none}, 0x8) 01:47:05 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5428, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:47:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x5, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1387.275340] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1387.296459] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:47:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:47:18 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5429, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:47:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:47:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:47:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x6, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:47:18 executing program 2: ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 01:47:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(0x0, 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:47:18 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:47:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x7, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:47:19 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:47:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x8, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:47:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 1400.607546] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:47:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x9, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1400.615084] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:47:19 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5432, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:47:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 1) 01:47:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(0x0, 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:47:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3e2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:47:19 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:47:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xa, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:47:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:47:19 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5435, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:47:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1cd9b300", @ANYRES16=r2, @ANYBLOB="010300000000000000002000000008001701", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r3) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000740)={'syztnl1\x00', &(0x7f0000000680)={'ip6gre0\x00', 0x0, 0x29, 0x7, 0x3, 0x1, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x42}}, @mcast2, 0x20, 0x7, 0x5, 0x6}}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001000), r1) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000001140)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001100)={&(0x7f0000001040)={0xb8, r7, 0x400, 0x70bd25, 0x25dfdbff, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x7}, @NL80211_ATTR_VENDOR_DATA={0x8a, 0xc5, "1d55a809684df3637b1b87dee8b59fecfdef2769238afd96801d5dfa422592efb015df8513786907df28ba0d84b2979c165dc1a49a46cd37d6e6060741ff7c3042f34716699dc38ca714b7f4409e565a29de8217bb14eecd74986b77754546979246d786ce4a26bb7560fdee2e597481970e1e6b29f2929b4b65a1ad097f9c9af0e876e9380b"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x5}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20008810}, 0x20004050) sendmmsg$inet(r3, &(0x7f0000000ec0)=[{{&(0x7f00000002c0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000380)="4de10e3eb3714280625c57ea82109e01dd9d31dd872842f43e24b6c1b11aa349ffe52dd99e63dee563ef53d0af837e380f930ce884b8ab5c8630c172066852f48c499b63c53337c0f3b2815d24284283697e9973d654c608316ecdfa9cf2552d136f9af906a8c621495d0c6802f5c8fb639ab73c74d1201594ddca2c3a04bbc61f63c5bfbd7467be10a21421b0ccfd23808e2c89fa18e4b192eb5b216ebe0e5262016f9e42aaf2c83145ddb0c9ae28c0470569abf310fe1f621c6463be8f983753f5a2e939e8d43b8576acced551dd563667d83e81fca9682e01f1582d1fec6068dd77a52b7f6e1288a9bd08330a5100f9f9315e3f6c24", 0xf7}, {&(0x7f0000000480)="2175e0c9bf44cddffc0ac8d3e8141310dd4aaa3319cdb9135ad53fec54d9aa37c7d13837d14cd4140bc7e45ae352581f6ece38283dc11cbbee6e1131a8e4ef64aaf1f5459fc09fb5fdc888fe3f556394ee1bce7505246a673e03de28c03132a0be82904238150b514e505fe8b04927a03c94ee8facda63d5a6d4c07fcec58b7ef70e5a773eefa018363f9091289de5414eb55de29fbc93a430bdbaddfc", 0x9d}, {&(0x7f0000000540)="800b9953fb7c7aa8dc51af9591d374b13963c0b75da3bb2088b9b3e64808df1ccd6cc985d4eda01c3b35c626e6466878912637c9b430e75d8e5e240337f19621f3a223d5029dc5bd75709736bf819bb7b6b932f907b9ac498a013bfbc4688c7baf70bf4c6b89116404ffda8fb700f19ea9de14aa670c17c3bccc766267b05af04fbc79002a87845cee36cbdca651e2c021037c9eb61f48d00f48c1b14ade3bb1c58fb09ab17c9de11e89e21ffe54df036251e11b83a6a5bad3d2bd69d6fe79df2fb5b70f6d530578a6f27420a8238e89", 0xd0}], 0x3, &(0x7f0000000780)=[@ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @dev={0xac, 0x14, 0x14, 0x2c}, @dev={0xac, 0x14, 0x14, 0x13}}}}], 0x50}}, {{&(0x7f0000000800)={0x2, 0x4e20, @private=0xa010102}, 0x10, &(0x7f0000000980)=[{&(0x7f0000000840)="ad1d4bd28bc24793aa43a36f20f8832cf24770887ce8526df6d92478404c69bb1be8cdab2dc3f6ae692c781ee80cb38f7a0ff710d9af1a1d5501676dace1ba01baadf5b44b9eed2707bf240d565660ee5d9b6f327544d452d3184e2368fe1ffcbf753ac82fc4d388f9b9f899029aaa76ce3f5ef5072049f20179431aa05f5186a2c59ca6a67de90f5629dae8d1dd2766604ee5de", 0x94}, {&(0x7f0000000900)="5b555bc278637b1829be0314305cf4340edbac9a16ed53f567adffc076df8254965fd145ec30984e04807589b937905143bbc281ca23d441934531e61eb223d0912bf4bee86bf1e1b749647b9a56bfc5637ed6", 0x53}], 0x2, &(0x7f00000009c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_retopts={{0xac, 0x0, 0x7, {[@end, @generic={0x82, 0x9, "812050be97e942"}, @timestamp_addr={0x44, 0x44, 0x47, 0x1, 0x9, [{@dev={0xac, 0x14, 0x14, 0x14}, 0x5}, {@rand_addr=0x64010106, 0x48000000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x81}, {@empty, 0x9}, {@empty, 0x7}, {@local, 0xfffffffb}, {@broadcast, 0xe0000}]}, @timestamp_addr={0x44, 0xc, 0xc4, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}, @timestamp_prespec={0x44, 0x14, 0x8, 0x3, 0x5, [{@broadcast, 0x81}, {@dev={0xac, 0x14, 0x14, 0x3b}}]}, @ra={0x94, 0x4, 0x1}, @generic={0x94, 0x6, "51c86ec8"}, @ssrr={0x89, 0x1f, 0xf2, [@local, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @private=0xa010101, @local, @loopback]}, @noop, @noop]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @loopback, @remote}}}], 0xe8}}, {{&(0x7f0000000b00)={0x2, 0x4e24, @private=0xa010100}, 0x10, &(0x7f0000000d00)=[{&(0x7f0000000b40)="bc5971444a397ba72bc2f6707535dbeb5dbc33cfdf52be1903f293200d64d556ae8e4464d7652e058b9494ddc651556cdefa8346ba7bb0896151b81b261e72def29dc72568e9034d39cf3caf31c23823869dfa7ddf998321f8317347be1fc3c98f06586eaf2dca7c405f4d7f835f73cff4894ec329a0cc045fcf72dfbf15e52de900bd2764d13bcb53c0c15de1cd74f8d9707a4561594d594b6e5fdd3a081e1570ff1b3107b5dee4ea6846aa6222fb503a11ac53084f5f", 0xb7}, {&(0x7f0000000c00)="32155dd9b57541fcc8f75344a5f0bb5145f38443db32c7b581220d8bf0922a87c688fa8468da0dec9851de1803a254a8af88e1eac2553e2b694110754ae1b29f098db28880e165544f97f8897793d90a9f7c1d9c11bee7407a2cb7323c2972dae66f35e00c05bba36f4be3942eb584a064be28505bdb71feeb480b32ff0ada", 0x7f}, {&(0x7f0000000c80)="209bed0960149d96c29071ae7c38ff88e6d7f490d412b45bd4e421346f1698", 0x1f}, {&(0x7f0000001640)="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", 0x1000}, {&(0x7f0000002640)="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", 0x1000}, {&(0x7f0000003640)="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", 0xffffffffffffff3d}, {&(0x7f0000000cc0)="1a4ac321f32e39e7b342a87f9be15811831dd18156332fa593be866ecfd475960ac6f430cc04cc9bb46fe400e506", 0x2e}, {&(0x7f0000004640)="14c3923f4cc1a3873d4de45f1671b0014ef7b36d6812474dec82f8e8b6142e50fa49d0d9353177acc19e351d2dddb82c7de74a4d7dd737a969180d12a5303a0634671f77f6d9da5da630db5c1ed74fced2335b0330f3047006d5474a0cc82aa9365c6480415959efb21202c17d398c13fd440655a17edd02f70294ec3e2947905deb9837720583af54f64fe642012affc63ea145428901cdcffaef9e68047c78af866362b32f0b32cfb73d039f181e35fb5c70b39907e2e451bdc75b42fc05f9f26a475fe19fed88c2d277c1347f63b30e5840439114ef32939ae3fada7a6eeb2f826f0612991b17a1be72256967b5faab99363c55039ff5a672e9989bfc79869be64dcac1087fc1fec689f2ad06bd5527beb5e2de2e15770c0b6f95f2f0da71d9521d08654309871e9feab0d8b7f9844278a6069fbdd2e4547624164c7acb2bb84ec5c9e439c6eb84496b10816b68240f146bee1f6f339c57dbfb86a8f0eefdbb6317bceebb5644c068fba1d108129f3e16d72df8af93ea7d6495c6fd944a96f92943dd0f9d923cd36d3c4c452718b922242cc58d38f29b256289aa01e7bcac14c3375c0777c6ecc810be43b8d72f0359055675775ce7f4c032f15f2327f2d05ee93326ea862b6e05093acded5e2651eb4e13cfa381a78a6bba3f1970b246a3b05449051d3bee7d8602894ee4809672df3299c368caf8d0f28ab5640bfab17bfc8fe9d19fbd6eca55857353f148bb72fe464bae710536a27b99e20bf7abfe3eb8c24f149eeea4f18136de5977200a2535fa464c424cf74b309e3bcb09e93a1656c4ced9364550906ac346f88ce3849220e81ac9957fed35d0852e72b895927ce7a254b8afc3f770e93b3b12f759f23cf46ed07fce350943c7b851b2b5ff580ce90eef0c5f6f5b5488b382c2a3b5c1c87e4476c1b44747fb55e080e17d7f2e4d21419c229e679698cb01bea88251b58fdf6fc767500be8ccc1105aca0be2816660be8597cfd14b9906c3f36e98b03bf014653ed5a5c888227199f578f735ee843d848685d52731fb80baa1821a9bb20de252998b8e1f08bd7775a1f15360f946f842944cf373fdc888308e547c292fadd76c4282d981a1c0871ce1b54ff741addc46a52c4e5e8df874f35a168b5b5e0d97f905e0298d21388b6531b8d3e50c3aa7a40058e55d64980aa2c4a433bee3e6b08d0023dcd53bf703545be1f506691f786db3dcd21540ecfc5977db7875ebba3b9d8433e6c43b047b59d12d03d2cacb8f127636c3d8bd27e2b169296aae849b848f158fca3153b0cbacc9ce3c6fe17916440e5afa7a33cb44c1f1014de5a33e628c2fbc92d104ed73c7876798704e71f2f62bb623a750a834bcb12bd31d82bf7c37eb7e4762bbc9fe9b89f002e347351957424e7237055c8fade63aa010ee11a9694913bdc7c2575d0a65a269d648c6d119afa102540bd0cd36b959c98264524b4fb80ca9da68befb798fb17c6efa8e960a932d0905f0a7c9c2eace1475482dfcf01548aef5e9f8b2b30ccbc9d2fe0f61e0fe231b170ba73b14b416396958eb6c41686923de2e5723bf07cf9fe439e075995f9fe14ba0907c77a74c29b0796765c41c25e108b8bc85df646f8777b4a37c8ab222218bb5bd3b59b2484e0ef7ffc5d55eb883bb24edc61d7d7213a5c5db5f53684bd51ac2be7311a556b2c0010162310ea3d9e7b003507333a996e0628be0b644de7f8a41ee28afda7ec18aac42e0c376faeb2cea1761866f672b2b2a6bcd6c444aeda2b6447c805e2da6c4abc5798f19f696b9325a3d0f8e63bace5d0f52458ce77b535f8e581cb2e7f31f652735988100adeb20cce02801c43c4be8c510d1e687ddf5736e81eee82862b85e0ef3d5df38f691286141bf3ae10303fa86b18275ea70e0f169b3543527677cdfe162fb6c8d4223d4821ddc06077632b0512e008d5bdc21a7b687b11483f9ce91104db81c3920820c28ac5d2cf7436b5d56ad0bf16a836e012cb0e0f5f0cbe6844c9c826adbb043c340226c12862e5a489fa4c52e4416e7542e908ac2b131f78b75695f7745211012c512cef39a5d1be07a6f150de0b91ad4ad5dc84fac1f819a9d2864e92ba3ba8ebd47fadcdd508c563c5557f93ad2a954ccc9cab0d915b0c7affbe3fc0e7c415282f1464f9a9d873dc10a87ea1371ca85771b2e11dc495d0cbf9c82011eb97f41d355df844b574291581e614ea4a7fd9355899254d4e2bf0a65fcfc4f2dea99be72090bdfeb0ba9ee78663524526ffbedb80e27fadaf1f214a3f0fa9633b133374f7418f69ffdaf43b0fa119c6fe24df4a2b9d635d089db85fba0e60c363544dfa230176391f2f35c281be0e6253e102ad5ea972c416c8c995a46c3549f606c67b4e0bcacbfc2caf5e52c9ba585f2bbebfe55d6824cef8646b4e00d2e5223443f78ee975961966ad7010fc8ff5890c1a08e3db91b1c4ad683463f8b3aefe972d65a8cc137d623d3251727db870bb65878ca17f9422bec478b1b11b4107df5f7961aea473dc37fdb8c2703632ed1293effc693969d015b9e899ff3182bc4fb22cdd6ea4fd7a8bcabe9ec75e16181a9fb6d6a82305d45d60485711b945b3ad19215f4dbf9f980000d2ad8d140473dd0a1dd3bf3673986afb66f67087f2cba0ca1562ac89d8bb4a94f0167e87ce2118711c18f6c2700eabe63d779497b11495a021ad5cbba9b721b72a096cd876eea2ba9b36190183fc54a51024ffefb18dcb767716b942578304466134addbbaec47f52d61b0816e4143ca1ab57e09828e7a9c73e09da5cddf97f9fd774b56d680b73cafac629031b532f287b25ba2b0220db9cea4dec69b05f88a82c305130f6be5eea9f873b82b202bca81fc19992b6384f7a999a362a7f718634e630e040f826654a2627a4adf86ebb0a51f5877aa850e13b0412958631fa1d3c19f8b500f8e5dfcfcf2a9e39fcf72a564812515f0c043c37b9b5645f0dadd12c41dac915ce2ee4265fdfbe8bd20f30c7bc25bbcd4ec37f2323ce814202d60dec7879eff2939e8491197159d979d412b50e9ee9e99b9b91c9e5176ef072582d50bbf5da9820b947ed58a4671f8e7d3126d79c931cb45883ea1bbd6c70044a6e38c96985224d87d8a51f80928e006a22590a034473ef60f7b6a14b33ffb6e2c37f52a5697d080a359d6af7e0102c67d5049b785bc2a49e50526d2bde8d940d468c509705a05141300572d4e419ab1dec210372f4a5d0562bc59f7f43e74174ccb28e4c5c3e18a9f33a78ef71b9766ff7cce9c73d0f921c6aa4c214befe0e8ed8930c60be86d2391182c941ccb1a37cd0a0835884f0f0e257b6295becd61020cb4f6e70edd86ac35db402d0afa78af9f55d47528ed992c4257b404926fb4f51eabdefbf89e99e77027ee9b7651e445e74978c6b911ab78ec0526804c13181357ffba1847f4b6b4497ff336847cb36495cb2c1d78a36d2f24b5de2339d609f8f8b5cfea9ddda5a85f961250e24a5f6b301dda0d1e8b1dd59292ed0e71d1e43a9b924c0f27f27847672b9460d7233ea75459af89b217ac7620d507335b27b8348d9759a68ffc9add04703b3fd431d53de5f48dc4f921e7c08a8a27007f95d49f084ff6ce02ea26a50a801e0a79628fb7d16770a6fe58526c1703243534b4eb3f50fcf419f34a61b05e7656beb17d9513eb654b8c68cc0a6add6fbd0b6ab7d102c25fdd1d5887bae4ecdf63d64dd9ed8cdc8ea100702a310b93df74f38fa2f18102edc8e28938700f70e4ba2e5f61f6a0a5c3bb3763a323980b206917e3e9619619b8e8f426c8aff965d8f7d063dbd28ab8cc80df3e38c4fa77c50b498c7557908769d8c8bec5864b718aa3da1bf6f6fd0574782b9762c9ed9a81d2fa751277b04a079578fc47b4f62eb43a029c196f3555ec8c3aadc1ac3163f57d0b4fee58b17c50190d33342340e5065f4da5540f9b46eb1122d85b42230ba63c0206e4768c21729b16271e0a554adc7230396f9c86c498e02b1531d0362074a4d14a74d0abffd681d73eced905c5fdb29236377b688f9ab479c61d9446b5854904979ace798cb07ebbd66dd01d7b348d0b5cf569afc4e286fc57a58d1da146c76814c1f13a57f56376d461a4c04f4b5e6c0f2719e10dd17a3cc3825a36b9cd06060e305ae429d689c71fd0c6b4b037c475d2fe113e9011ee614325c6c574d86eb6adc4eddf3fbfa38facb4d4fad5c7e21633f524f6f66bef01a647f1d8a3259f4639d0ec15a8e46070ca315a3a05891d495c69686f09b2de5e8aa7c0910b55347615a43cb7250004c42f5475f5a1673c01880352ee8c987d81a0906347f6c3299913bf5d084116c5af008df391c91e072e5c564fb699fb7fb9a134f3acf837daf4022d9a28290098182d8d894751b4d58bf4891c24f5af6033eeeb34f9dadd210db9fe6c08ffe941446650ea98c6f0c52d467cc8a47e0a7567edbe3e6a97a2450c91318461ffcba099e68e5a87adcf5140ca9489d2a1d89c51cf36cdcbd363709310fa666aee01eb7d872532a8ad007bc773a35446497562e2832a3ba4247d432f2da400e38e6d2f36f8fe1aa394d8aeac809b51ba6de0c013b9edc078da4abb71c9358637d4cf4e783a265772bd6d43eeb8307191e9641bc413edd9656a7e910132cdff7227e2b6f5272a91367a0325a851f83ef583a5df32fcf45efdcabca0b876dfa3da5865512c5736ebd4d2aa9d45801abc627cc9326d01ca7b9e139c188c40d41699be3f746bf1663b1251223a771d6152e014a53b45d9d9befd4ccec0157a5d4a98751eaca378022c29f03a1ad661c989b2e4111c299fb883f64f0302cc01ccf8ea1709209c85e813894719d27e6c3db8590aeff6b5cbc6b47afc42909bb5ab3079a923afcb20a83c93c98605b6da9c52f605a28ba18b2b7bf83df6151352322cd0f6c83139506337b6e8b178a0249753d5c6156986ec761bbbfa6c30c37e81c5b9afc15794756eae1fb438b6baa8d31694095efc01fa946d013fc363521f0314ab78632b3ba4eaa299ad3ee4640f53fc9f940643fa2aedf0160ed8b9d36d3fc76ea527358bf7d1ff24b5acc2e4bdabc69a3637770774490f8efa61e0d7167c305546dd4a0c9e6c04811730e574e5a943104c8c9dff03c207466785a8401b4a2877f019696a9a5fcf605488d04828cd4bd720f2a04d33db5a22fd29c33e85bec1dad9b9b01cb7934a4d1456216f12517392e586b2d1d179851bb1221de49c0665e16992f81433551e163fd1de9524d1c0362919679ea655a20770fa93cfa5469552df56e6f20275c442f8f3135b802ae69aeb7c302ef78ecddf592dbe19d1b90943a166af5015470db98b4bad0b57f85467824c2326cb433a818334cbc7a50f4e04a5e4cc83373d4d0a01bb8ae70573496e20db55be55d09ec716e06e121800378b0cc34d3cf8359194eebd854a6ecefa255f654aef69b84ac97f612e9c1a43d39b5984afb13dcbcbccec4e40a907881e29c962a15dea77c16effb8321832d52b6b030371b529a4f871499d2dfa485a3fbc2ddf4c666ee94d9a2d05414717cca7944c821f07842fb02ccd8a6f535932214e940c16c1d723316dd93cd2724328eb31c259f2b4381c8be64deb992b55fef67a86a4d8d1fdf2426ae4ffe748e26f6a3554c5bcefa0d28fa2418bd0f5993ef97963fb8086aa867c0345fbbf151879150da41c18b6171b1804f93b9c2a579a020433982c7b16d9b20a0c1be762a688720d9b320743df07e6f41798eb9663f80553a7219657aea3257af026ceed19225440365214b61", 0x1000}], 0x8}}, {{&(0x7f0000000d80)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000005640)="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", 0x1000}, {&(0x7f0000000dc0)="e530fe6a6df7e0d1a98c5dd0cd1c2da79dce3481686d34a7f68171c3770a4c9b14fc0b6119824083debe533d98d98e0b8bc9e2f19936469041f7d5a026c7e2e1af4f7dc4348fd1b5de41f15a436a40fd5cdb6a38b8d7ecaf61c7f06ad559fd34179a7d1ecdbbcc031425876da4a5192ba7836aceb3703019ab090843bb8757cd7be11a56625c61489c05fbfd20b31a03dfed99a3ba6529", 0x97}], 0x2}}], 0x4, 0x80) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fcdbdf251d00238008001a0002000000080017000300000006001b0080000000060400000008001a000300000005000e0003000000082003005988cd64f7de11468d4eb9d9721710fdd67b00000000000000", @ANYRES32=r5, @ANYBLOB="0c009900060000001b0000000c009900b7080000790000000c002380050005000a0000001c002380060010000300000008001500fb0000000500110000000000"], 0xa4}, 0x1, 0x0, 0x0, 0x10000015}, 0x8000) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r2, 0x800, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r8 = syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r8, 0xc018937c, &(0x7f00000012c0)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x40100}, 0xc, &(0x7f0000001240)={&(0x7f00000012c0)={0x4c, r2, 0x100, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x3, r9}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x3}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @key_params=[@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "72030b98e47a9cbc6bff564695"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}], @key_params]}, 0x4c}, 0x1, 0x0, 0x0, 0xc0}, 0x4040004) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) [ 1400.807472] FAULT_INJECTION: forcing a failure. [ 1400.807472] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1400.809094] CPU: 0 PID: 8818 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1400.809995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1400.811152] Call Trace: [ 1400.811547] dump_stack+0x107/0x167 [ 1400.811992] should_fail.cold+0x5/0xa [ 1400.812467] _copy_from_user+0x2e/0x1b0 [ 1400.812982] __ext4_ioctl+0x2766/0x4190 [ 1400.813505] ? ext4_reset_inode_seed+0x450/0x450 [ 1400.814113] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1400.814848] ? find_held_lock+0x2c/0x110 [ 1400.815560] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1400.816364] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1400.817103] ? do_vfs_ioctl+0x283/0x10d0 [ 1400.817710] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1400.818446] ? generic_block_fiemap+0x60/0x60 [ 1400.819022] ? lock_downgrade+0x6d0/0x6d0 [ 1400.819584] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1400.820194] ? wait_for_completion_io+0x270/0x270 [ 1400.820787] ? selinux_file_ioctl+0xb6/0x270 [ 1400.821340] ? __ext4_ioctl+0x4190/0x4190 [ 1400.821845] __x64_sys_ioctl+0x19a/0x210 [ 1400.822344] do_syscall_64+0x33/0x40 [ 1400.822799] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1400.823451] RIP: 0033:0x7fb08f3deb19 [ 1400.823926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1400.826182] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 01:47:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) [ 1400.827111] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1400.828175] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1400.829070] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1400.830001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1400.830908] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 [ 1400.831661] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1400.860191] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:47:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:47:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xb, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:47:19 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5437, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1401.060767] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1401.077118] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:47:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 2) 01:47:34 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5441, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:47:34 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:47:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000040)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 01:47:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:47:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xc, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:47:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:47:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 1416.483463] FAULT_INJECTION: forcing a failure. [ 1416.483463] name failslab, interval 1, probability 0, space 0, times 0 [ 1416.485926] CPU: 1 PID: 8863 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1416.486899] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1416.488036] Call Trace: [ 1416.488405] dump_stack+0x107/0x167 [ 1416.488908] should_fail.cold+0x5/0xa [ 1416.489434] ? ext4_find_extent+0xa77/0xd70 [ 1416.490027] should_failslab+0x5/0x20 [ 1416.490545] __kmalloc+0x72/0x390 [ 1416.491040] ext4_find_extent+0xa77/0xd70 [ 1416.491623] ext4_move_extents+0xb51/0x3050 [ 1416.492263] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1416.492964] ? lock_acquire+0x197/0x470 [ 1416.493518] ? find_held_lock+0x2c/0x110 [ 1416.494071] ? lock_acquire+0x197/0x470 [ 1416.494622] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1416.495283] ? lock_release+0x680/0x680 [ 1416.499860] __ext4_ioctl+0x302e/0x4190 [ 1416.500418] ? ext4_reset_inode_seed+0x450/0x450 [ 1416.501053] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1416.501749] ? find_held_lock+0x2c/0x110 [ 1416.502322] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1416.503077] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1416.503765] ? do_vfs_ioctl+0x283/0x10d0 [ 1416.504313] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1416.505015] ? generic_block_fiemap+0x60/0x60 [ 1416.505618] ? lock_downgrade+0x6d0/0x6d0 [ 1416.506167] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1416.506820] ? wait_for_completion_io+0x270/0x270 [ 1416.507466] ? selinux_file_ioctl+0xb6/0x270 [ 1416.508083] ? __ext4_ioctl+0x4190/0x4190 [ 1416.508636] __x64_sys_ioctl+0x19a/0x210 [ 1416.509156] do_syscall_64+0x33/0x40 [ 1416.509646] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1416.510327] RIP: 0033:0x7fb08f3deb19 [ 1416.510784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1416.513050] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1416.513981] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1416.514849] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1416.515718] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1416.516616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1416.517481] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:47:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = accept4(r0, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x80, 0x80800) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000400", @ANYRES16=r2, @ANYBLOB="00032abd7000ffdbdf250b0000000500330000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8400) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 01:47:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:47:35 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5450, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1416.612845] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:47:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3f2, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:47:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:47:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 3) 01:47:35 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1416.709694] FAULT_INJECTION: forcing a failure. [ 1416.709694] name failslab, interval 1, probability 0, space 0, times 0 [ 1416.711098] CPU: 0 PID: 8896 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1416.711945] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1416.712949] Call Trace: [ 1416.713277] dump_stack+0x107/0x167 [ 1416.713721] should_fail.cold+0x5/0xa [ 1416.714188] ? create_object.isra.0+0x3a/0xa20 [ 1416.714752] should_failslab+0x5/0x20 [ 1416.715218] kmem_cache_alloc+0x5b/0x310 [ 1416.715723] ? lock_release+0x680/0x680 [ 1416.716229] ? mark_lock+0xf5/0x2df0 [ 1416.716688] create_object.isra.0+0x3a/0xa20 [ 1416.717222] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1416.717842] __kmalloc+0x16e/0x390 [ 1416.718281] ext4_find_extent+0xa77/0xd70 [ 1416.718799] ext4_move_extents+0xb51/0x3050 [ 1416.719343] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1416.720004] ? lock_acquire+0x197/0x470 [ 1416.720488] ? find_held_lock+0x2c/0x110 [ 1416.720989] ? lock_acquire+0x197/0x470 [ 1416.721475] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1416.722114] ? lock_release+0x680/0x680 [ 1416.722618] __ext4_ioctl+0x302e/0x4190 [ 1416.723110] ? ext4_reset_inode_seed+0x450/0x450 [ 1416.723688] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1416.724347] ? find_held_lock+0x2c/0x110 [ 1416.724866] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1416.725562] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1416.726185] ? do_vfs_ioctl+0x283/0x10d0 [ 1416.726676] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1416.727309] ? generic_block_fiemap+0x60/0x60 [ 1416.727874] ? lock_downgrade+0x6d0/0x6d0 [ 1416.728409] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1416.728998] ? wait_for_completion_io+0x270/0x270 [ 1416.729591] ? selinux_file_ioctl+0xb6/0x270 [ 1416.730125] ? __ext4_ioctl+0x4190/0x4190 [ 1416.730631] __x64_sys_ioctl+0x19a/0x210 [ 1416.731142] do_syscall_64+0x33/0x40 [ 1416.731608] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1416.732249] RIP: 0033:0x7fb08f3deb19 [ 1416.732705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1416.733640] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1416.734952] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1416.736905] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1416.737775] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1416.738643] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1416.739511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1416.740402] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 [ 1416.741665] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:47:35 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5451, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:47:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 01:47:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44, 0x1}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 01:47:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5452, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:47:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fa, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:47:48 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:47:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xe, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:47:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:47:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 4) [ 1429.755008] FAULT_INJECTION: forcing a failure. [ 1429.755008] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.757322] CPU: 1 PID: 8928 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1429.758211] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1429.759293] Call Trace: [ 1429.759648] dump_stack+0x107/0x167 [ 1429.760132] should_fail.cold+0x5/0xa [ 1429.760656] ? jbd2__journal_start+0x190/0x7e0 [ 1429.761261] should_failslab+0x5/0x20 [ 1429.761773] kmem_cache_alloc+0x5b/0x310 [ 1429.762313] jbd2__journal_start+0x190/0x7e0 [ 1429.762901] __ext4_journal_start_sb+0x214/0x390 [ 1429.763534] ext4_move_extents+0x10bb/0x3050 [ 1429.764146] ? lock_acquire+0x197/0x470 [ 1429.768726] ? lock_acquire+0x197/0x470 [ 1429.769251] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1429.769942] ? lock_release+0x680/0x680 [ 1429.770491] __ext4_ioctl+0x302e/0x4190 [ 1429.771025] ? ext4_reset_inode_seed+0x450/0x450 [ 1429.771698] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1429.772435] ? find_held_lock+0x2c/0x110 [ 1429.772982] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1429.773737] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1429.774438] ? do_vfs_ioctl+0x283/0x10d0 [ 1429.775013] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1429.775707] ? generic_block_fiemap+0x60/0x60 [ 1429.776298] ? lock_downgrade+0x6d0/0x6d0 [ 1429.776879] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1429.777518] ? wait_for_completion_io+0x270/0x270 [ 1429.778164] ? selinux_file_ioctl+0xb6/0x270 [ 1429.778796] ? __ext4_ioctl+0x4190/0x4190 [ 1429.779377] __x64_sys_ioctl+0x19a/0x210 [ 1429.779939] do_syscall_64+0x33/0x40 [ 1429.780443] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1429.781123] RIP: 0033:0x7fb08f3deb19 [ 1429.781610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.784013] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1429.785022] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1429.785951] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1429.786876] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1429.787712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1429.792369] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:47:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 01:47:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:47:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 5) [ 1429.893145] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:47:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5457, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1429.938601] FAULT_INJECTION: forcing a failure. [ 1429.938601] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.940067] CPU: 1 PID: 8947 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1429.940916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1429.941921] Call Trace: [ 1429.942247] dump_stack+0x107/0x167 [ 1429.942692] should_fail.cold+0x5/0xa [ 1429.943160] ? create_object.isra.0+0x3a/0xa20 [ 1429.943727] should_failslab+0x5/0x20 [ 1429.944195] kmem_cache_alloc+0x5b/0x310 [ 1429.944716] create_object.isra.0+0x3a/0xa20 [ 1429.945255] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1429.945881] kmem_cache_alloc+0x159/0x310 [ 1429.946394] jbd2__journal_start+0x190/0x7e0 [ 1429.946944] __ext4_journal_start_sb+0x214/0x390 [ 1429.947530] ext4_move_extents+0x10bb/0x3050 [ 1429.948091] ? lock_acquire+0x197/0x470 [ 1429.948598] ? lock_acquire+0x197/0x470 [ 1429.949089] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1429.949733] ? lock_release+0x680/0x680 [ 1429.950245] __ext4_ioctl+0x302e/0x4190 [ 1429.950740] ? ext4_reset_inode_seed+0x450/0x450 [ 1429.951321] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1429.951966] ? find_held_lock+0x2c/0x110 [ 1429.952483] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1429.953187] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1429.953820] ? do_vfs_ioctl+0x283/0x10d0 [ 1429.954317] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1429.954960] ? generic_block_fiemap+0x60/0x60 [ 1429.955508] ? lock_downgrade+0x6d0/0x6d0 [ 1429.956020] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1429.956625] ? wait_for_completion_io+0x270/0x270 [ 1429.957222] ? selinux_file_ioctl+0xb6/0x270 [ 1429.957762] ? __ext4_ioctl+0x4190/0x4190 [ 1429.958269] __x64_sys_ioctl+0x19a/0x210 [ 1429.958769] do_syscall_64+0x33/0x40 [ 1429.959224] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1429.959868] RIP: 0033:0x7fb08f3deb19 [ 1429.960324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.962589] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1429.963519] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1429.964399] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1429.965276] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1429.966147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1429.967020] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:48:02 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:48:02 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x545d, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:48:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 6) 01:48:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x2}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 01:48:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xf, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:48:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fa, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:48:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 01:48:02 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5460, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:48:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x10, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:02 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1444.066577] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1444.073571] FAULT_INJECTION: forcing a failure. [ 1444.073571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1444.076045] CPU: 0 PID: 8982 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1444.077008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1444.078123] Call Trace: [ 1444.078557] dump_stack+0x107/0x167 [ 1444.079032] should_fail.cold+0x5/0xa [ 1444.079600] __alloc_pages_nodemask+0x182/0x600 [ 1444.080232] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1444.081092] ? find_get_entry+0x2c8/0x740 [ 1444.081694] ? mark_held_locks+0x9e/0xe0 [ 1444.082236] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 1444.082990] alloc_pages_current+0x187/0x280 [ 1444.083616] __page_cache_alloc+0x2d2/0x360 [ 1444.084180] pagecache_get_page+0x2c7/0xc80 [ 1444.084801] grab_cache_page_write_begin+0x64/0xa0 [ 1444.085509] ext4_move_extents+0x1203/0x3050 [ 1444.086116] ? lock_acquire+0x197/0x470 [ 1444.086722] ? lock_acquire+0x197/0x470 [ 1444.087293] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1444.087984] ? lock_release+0x680/0x680 [ 1444.088579] __ext4_ioctl+0x302e/0x4190 [ 1444.089126] ? ext4_reset_inode_seed+0x450/0x450 [ 1444.089790] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1444.090552] ? find_held_lock+0x2c/0x110 [ 1444.091101] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1444.091896] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1444.092601] ? do_vfs_ioctl+0x283/0x10d0 [ 1444.093144] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1444.093877] ? generic_block_fiemap+0x60/0x60 [ 1444.094542] ? lock_downgrade+0x6d0/0x6d0 [ 1444.095096] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1444.095789] ? wait_for_completion_io+0x270/0x270 [ 1444.099224] ? selinux_file_ioctl+0xb6/0x270 [ 1444.099849] ? __ext4_ioctl+0x4190/0x4190 [ 1444.100445] __x64_sys_ioctl+0x19a/0x210 [ 1444.100997] do_syscall_64+0x33/0x40 [ 1444.101537] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1444.102203] RIP: 0033:0x7fb08f3deb19 [ 1444.102762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1444.105240] RSP: 002b:00007fb08c933188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1444.106322] RAX: ffffffffffffffda RBX: 00007fb08f4f2020 RCX: 00007fb08f3deb19 [ 1444.107316] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1444.108294] RBP: 00007fb08c9331d0 R08: 0000000000000000 R09: 0000000000000000 [ 1444.109292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1444.110233] R13: 00007ffe741e591f R14: 00007fb08c933300 R15: 0000000000022000 [ 1444.114456] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:48:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:48:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44, 0xf6, 0x0, 0x4003}, {0x6, 0x0, 0x3, 0x400000}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 01:48:16 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5600, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:48:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 7) 01:48:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:48:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x12, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040)={0x0, 0xea60}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x4, 0x1}, 0x6) 01:48:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fa, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:48:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 01:48:16 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:48:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x14, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:16 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5601, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:48:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x44}, {0x6, 0x0, 0x0, 0x400000}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) [ 1458.122883] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1458.128798] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:48:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, 0x0, 0x86) 01:48:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x15, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) [ 1458.203238] FAULT_INJECTION: forcing a failure. [ 1458.203238] name failslab, interval 1, probability 0, space 0, times 0 [ 1458.205725] CPU: 1 PID: 9019 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1458.206618] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1458.207708] Call Trace: [ 1458.208067] dump_stack+0x107/0x167 [ 1458.208549] should_fail.cold+0x5/0xa [ 1458.209071] ? xas_alloc+0x336/0x440 [ 1458.209582] should_failslab+0x5/0x20 [ 1458.210087] kmem_cache_alloc+0x5b/0x310 [ 1458.210629] xas_alloc+0x336/0x440 [ 1458.211103] xas_create+0x34a/0x10d0 [ 1458.211614] xas_store+0x8c/0x1c40 [ 1458.212090] ? xas_find_conflict+0x4b5/0xa70 [ 1458.212682] __add_to_page_cache_locked+0x708/0xc80 [ 1458.213348] ? file_write_and_wait_range+0x130/0x130 [ 1458.214012] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1458.214640] ? find_get_entry+0x2c8/0x740 [ 1458.215149] ? mark_held_locks+0x9e/0xe0 [ 1458.215648] add_to_page_cache_lru+0xe6/0x2e0 [ 1458.216201] ? add_to_page_cache_locked+0x40/0x40 [ 1458.216790] ? __page_cache_alloc+0x10d/0x360 [ 1458.217344] pagecache_get_page+0x38b/0xc80 [ 1458.217944] grab_cache_page_write_begin+0x64/0xa0 [ 1458.218591] ext4_move_extents+0x1203/0x3050 [ 1458.219198] ? lock_acquire+0x197/0x470 [ 1458.219732] ? lock_acquire+0x197/0x470 [ 1458.220258] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1458.220949] ? lock_release+0x680/0x680 [ 1458.221504] __ext4_ioctl+0x302e/0x4190 [ 1458.222041] ? ext4_reset_inode_seed+0x450/0x450 [ 1458.222666] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1458.223356] ? find_held_lock+0x2c/0x110 [ 1458.223906] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1458.224659] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1458.225338] ? do_vfs_ioctl+0x283/0x10d0 [ 1458.225893] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1458.226581] ? generic_block_fiemap+0x60/0x60 [ 1458.227174] ? lock_downgrade+0x6d0/0x6d0 [ 1458.227725] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1458.228369] ? wait_for_completion_io+0x270/0x270 [ 1458.229013] ? selinux_file_ioctl+0xb6/0x270 [ 1458.229616] ? __ext4_ioctl+0x4190/0x4190 [ 1458.230169] __x64_sys_ioctl+0x19a/0x210 [ 1458.230705] do_syscall_64+0x33/0x40 [ 1458.231196] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1458.231872] RIP: 0033:0x7fb08f3deb19 [ 1458.232363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1458.234785] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1458.235782] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1458.236719] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1458.237669] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1458.238560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1458.239433] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:48:16 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r3}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r4, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r6, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r4, r5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:48:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:48:16 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1458.345422] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1458.356775] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 01:48:31 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5602, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:48:31 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r3}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r4, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r6, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r4, r5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:48:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x19, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 8) 01:48:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, 0x0, 0x86) 01:48:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8000) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(r2, 0x8, 0x0, 0x8000) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, 0x0, 0xb99771294b5ad721}, 0x14}}, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000340)=0x9f, 0xf0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) creat(&(0x7f0000000380)='./file0\x00', 0x111) fchmodat(r2, &(0x7f0000000040)='./file1\x00', 0x128) fallocate(r0, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x100000f, 0x1f012, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r4, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r5, 0xb99771294b5ad721}, 0x14}}, 0x0) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f0000000300)) 01:48:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:48:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:48:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1b, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:48:31 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5603, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1472.979214] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1472.983881] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 [ 1472.984263] FAULT_INJECTION: forcing a failure. [ 1472.984263] name failslab, interval 1, probability 0, space 0, times 0 [ 1472.986699] CPU: 1 PID: 9070 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1472.987548] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1472.988566] Call Trace: [ 1472.988903] dump_stack+0x107/0x167 [ 1472.989351] should_fail.cold+0x5/0xa [ 1472.989821] ? __memcg_kmem_charge+0x68/0x140 [ 1472.990382] ? create_object.isra.0+0x3a/0xa20 [ 1472.990949] should_failslab+0x5/0x20 [ 1472.991415] kmem_cache_alloc+0x5b/0x310 [ 1472.991918] create_object.isra.0+0x3a/0xa20 [ 1472.992454] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1472.993081] kmem_cache_alloc+0x159/0x310 [ 1472.993595] xas_alloc+0x336/0x440 [ 1472.994041] xas_create+0x60f/0x10d0 [ 1472.994515] xas_store+0x8c/0x1c40 [ 1472.994953] ? xas_find_conflict+0x4b5/0xa70 [ 1472.995502] __add_to_page_cache_locked+0x708/0xc80 [ 1472.996117] ? file_write_and_wait_range+0x130/0x130 [ 1472.996746] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1472.997367] ? find_get_entry+0x2c8/0x740 [ 1472.997880] ? mark_held_locks+0x9e/0xe0 [ 1472.998389] add_to_page_cache_lru+0xe6/0x2e0 [ 1472.998940] ? add_to_page_cache_locked+0x40/0x40 [ 1472.999528] ? __page_cache_alloc+0x10d/0x360 [ 1473.000082] pagecache_get_page+0x38b/0xc80 [ 1473.000616] grab_cache_page_write_begin+0x64/0xa0 [ 1473.001220] ext4_move_extents+0x1203/0x3050 [ 1473.001778] ? lock_acquire+0x197/0x470 [ 1473.002290] ? lock_acquire+0x197/0x470 [ 1473.002777] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1473.003420] ? lock_release+0x680/0x680 [ 1473.003933] __ext4_ioctl+0x302e/0x4190 [ 1473.004428] ? ext4_reset_inode_seed+0x450/0x450 [ 1473.005009] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1473.005687] ? find_held_lock+0x2c/0x110 [ 1473.006217] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1473.006920] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1473.007553] ? do_vfs_ioctl+0x283/0x10d0 [ 1473.008049] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1473.008689] ? generic_block_fiemap+0x60/0x60 [ 1473.009237] ? lock_downgrade+0x6d0/0x6d0 [ 1473.009748] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1473.010360] ? wait_for_completion_io+0x270/0x270 [ 1473.010956] ? selinux_file_ioctl+0xb6/0x270 [ 1473.011495] ? __ext4_ioctl+0x4190/0x4190 [ 1473.012005] __x64_sys_ioctl+0x19a/0x210 [ 1473.012505] do_syscall_64+0x33/0x40 [ 1473.012964] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1473.013589] RIP: 0033:0x7fb08f3deb19 [ 1473.014073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1473.016319] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1473.017253] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1473.018167] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1473.019038] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1473.019911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1473.020786] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:48:31 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r3}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r4, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r6, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r4, r5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:48:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:48:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, 0x0, 0x86) 01:48:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1d, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x0) 01:48:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 9) 01:48:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 1473.264399] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1473.272197] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 [ 1473.391228] FAULT_INJECTION: forcing a failure. [ 1473.391228] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1473.392726] CPU: 0 PID: 9108 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1473.393557] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1473.394863] Call Trace: [ 1473.395191] dump_stack+0x107/0x167 [ 1473.395638] should_fail.cold+0x5/0xa [ 1473.396110] __alloc_pages_nodemask+0x182/0x600 [ 1473.396682] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1473.397422] ? find_get_entry+0x2c8/0x740 [ 1473.397926] ? lru_cache_add+0x45c/0x800 [ 1473.400865] alloc_pages_current+0x187/0x280 [ 1473.401412] __page_cache_alloc+0x2d2/0x360 [ 1473.401942] pagecache_get_page+0x2c7/0xc80 [ 1473.402481] grab_cache_page_write_begin+0x64/0xa0 [ 1473.403084] ext4_move_extents+0x1224/0x3050 [ 1473.403647] ? lock_acquire+0x197/0x470 [ 1473.404143] ? lock_acquire+0x197/0x470 [ 1473.404629] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1473.405272] ? lock_release+0x680/0x680 [ 1473.405778] __ext4_ioctl+0x302e/0x4190 [ 1473.414318] ? ext4_reset_inode_seed+0x450/0x450 [ 1473.414899] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1473.415548] ? find_held_lock+0x2c/0x110 [ 1473.416056] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1473.416762] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1473.417409] ? do_vfs_ioctl+0x283/0x10d0 [ 1473.417910] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1473.418571] ? generic_block_fiemap+0x60/0x60 [ 1473.419126] ? lock_downgrade+0x6d0/0x6d0 [ 1473.419655] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1473.420257] ? wait_for_completion_io+0x270/0x270 [ 1473.420868] ? selinux_file_ioctl+0xb6/0x270 [ 1473.421418] ? __ext4_ioctl+0x4190/0x4190 [ 1473.421930] __x64_sys_ioctl+0x19a/0x210 [ 1473.422454] do_syscall_64+0x33/0x40 [ 1473.422928] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1473.423569] RIP: 0033:0x7fb08f3deb19 [ 1473.424037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1473.426328] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1473.427303] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1473.428211] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1473.429123] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1473.430031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1473.430984] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:48:45 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5605, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:48:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x21, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:45 executing program 2: syz_emit_ethernet(0x2be, &(0x7f0000000440)={@multicast, @broadcast, @void, {@ipv6={0x86dd, @generic={0x9, 0x6, "b189cc", 0x288, 0x5b, 0x0, @mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, {[@hopopts={0x84, 0x19, '\x00', [@enc_lim={0x4, 0x1, 0xc}, @generic={0x1f, 0xbf, "d035a3caaaa3537193d360fa24cace11039b38a2570671e62f5fb92b1b7283a0135dfe1fd2cf254b6f83510b2d55c62c8eb6ac35f95c8a2c8366626608f81512875af42d8fde1e3cbef080dba35eb4aca0c1bd6729f963f4f9247b5946b88fa41956a0488bbdf7ccb137e824a882fbc6b1a4557ec79cbfc31e1b8bf59ba7285c5173580a20dbd92b64313df6dd6dc37aef7dda867307cc8a4c3e5c06557553dd4ef62b6fb97cdb5e8ea618b3fc7b34a3708a1fd54e7b506ecf1ed86d05c934"}, @ra={0x5, 0x2, 0x9}]}, @dstopts={0x2b, 0x2, '\x00', [@calipso={0x7, 0x10, {0x2, 0x2, 0x1, 0x4, [0x6]}}]}, @srh={0x29, 0x0, 0x4, 0x0, 0x3f}, @hopopts={0x16, 0x11, '\x00', [@generic={0xba, 0x2e, "8066fcb9795a18e114a50208b2a29490de6405c72cc00933d3858c3e159d4f5f16b62a2f2f81d2287467cb393980"}, @hao={0xc9, 0x10, @mcast2}, @calipso={0x7, 0x38, {0x1, 0xc, 0x1, 0x1ff, [0x4e1, 0x6, 0x1, 0x7ff, 0xfff, 0x7]}}, @jumbo={0xc2, 0x4, 0x1}, @jumbo={0xc2, 0x4, 0xfff}]}, @fragment={0x84, 0x0, 0x0, 0x1, 0x0, 0x4, 0x67}], "578328658b8697d7a314cde02009b0f57041a8d2f4d6d014f7fa2fde1669156f7036b0750ad69391ab112dc137d555e0b90945a1385b2b54dc7979dc7ab441136496010691e9dac6654c595a72747fd1aec2820c36d3f08bdc45cc495aa7384bf3cedd63ff7b642b60ffd0110b3adc1e5855b64e3d4f86083e493049788f5e7422f8b5a281e828bdd45e3d8451fb74244d881e5e01d1ab596b7acda3538efb877ae7816a7099bde131de0f2dcf0df4872c839a660fca10b4efab8db6df0f5225d6e7ba0771435258e3a44e452d270a943cf5a7428b35c5b7463809450946d5d43d118a9a5087f78847c7c8df6d8b9e85566e4769feccfde4"}}}}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x428840, 0xb) syz_emit_ethernet(0xcd, &(0x7f0000000040)={@multicast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x23}, @val={@void, {0x8100, 0x2, 0x0, 0x1}}, {@llc={0x4, {@llc={0xf8, 0x0, "ee", "62440e5c9567d447510f28d0101ce96699898f8fb505d1246a57df8f9af74aec2c7fec2463bdda3735906f2af0247d7a8d11a64a2da1f0b75e3670800afa0bfb90c25551ec3b7e8046e325cf42907c991bb7bb6fb0f4d99f653c64a3786ee61918f413158e40aeebb01fd9d9d276861dada6dc9c20ea891d132e4dc095e3d6598f16275ab20fd87bad1a6fcaa5d6bde660e27b9a3eb2f341f201dae9bc3f3feb97f9ae5b89ee36ad32dbedc51955f477e61d68e414aec35d"}}}}}, &(0x7f0000000140)={0x1, 0x4, [0x4bc, 0x499, 0x51e, 0x65f]}) 01:48:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 10) 01:48:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:48:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:48:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x0) 01:48:45 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:48:45 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5606, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:48:45 executing program 2: unshare(0x48020200) unshare(0x14020000) unshare(0x8020400) unshare(0x0) unshare(0x6040080) 01:48:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x22, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1487.026522] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1487.027410] FAULT_INJECTION: forcing a failure. [ 1487.027410] name failslab, interval 1, probability 0, space 0, times 0 [ 1487.030986] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 [ 1487.032093] CPU: 0 PID: 9125 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1487.032101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1487.032105] Call Trace: [ 1487.032125] dump_stack+0x107/0x167 [ 1487.032145] should_fail.cold+0x5/0xa [ 1487.043239] ? xas_alloc+0x336/0x440 [ 1487.044343] should_failslab+0x5/0x20 [ 1487.045475] kmem_cache_alloc+0x5b/0x310 [ 1487.046681] ? try_charge+0x62c/0x1160 [ 1487.047844] xas_alloc+0x336/0x440 [ 1487.048897] xas_create+0x34a/0x10d0 [ 1487.050026] xas_store+0x8c/0x1c40 [ 1487.051087] ? xas_find_conflict+0x4b5/0xa70 [ 1487.052458] __add_to_page_cache_locked+0x708/0xc80 [ 1487.053944] ? file_write_and_wait_range+0x130/0x130 [ 1487.055475] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1487.056988] ? find_get_entry+0x2c8/0x740 [ 1487.058217] ? lru_cache_add+0x45c/0x800 [ 1487.059436] add_to_page_cache_lru+0xe6/0x2e0 [ 1487.060792] ? add_to_page_cache_locked+0x40/0x40 [ 1487.062223] ? __page_cache_alloc+0x10d/0x360 [ 1487.063578] pagecache_get_page+0x38b/0xc80 [ 1487.064864] grab_cache_page_write_begin+0x64/0xa0 [ 1487.066378] ext4_move_extents+0x1224/0x3050 [ 1487.067711] ? lock_acquire+0x197/0x470 [ 1487.068904] ? lock_acquire+0x197/0x470 [ 1487.070077] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1487.071653] ? lock_release+0x680/0x680 [ 1487.072887] __ext4_ioctl+0x302e/0x4190 [ 1487.074082] ? ext4_reset_inode_seed+0x450/0x450 [ 1487.075508] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1487.077072] ? find_held_lock+0x2c/0x110 [ 1487.078290] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1487.080024] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1487.081553] ? do_vfs_ioctl+0x283/0x10d0 [ 1487.082773] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1487.084332] ? generic_block_fiemap+0x60/0x60 [ 1487.085668] ? lock_downgrade+0x6d0/0x6d0 [ 1487.086905] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1487.088349] ? wait_for_completion_io+0x270/0x270 [ 1487.089784] ? selinux_file_ioctl+0xb6/0x270 [ 1487.091109] ? __ext4_ioctl+0x4190/0x4190 [ 1487.092336] __x64_sys_ioctl+0x19a/0x210 [ 1487.093545] do_syscall_64+0x33/0x40 [ 1487.094654] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1487.096225] RIP: 0033:0x7fb08f3deb19 [ 1487.097325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1487.102882] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1487.105143] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1487.107291] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1487.109419] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.111571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.113735] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:48:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x23, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:48:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:48:58 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5607, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:48:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x24, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:58 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x42800) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0x9, 0x1ff, 0xb5, 0x7, 0xffffffffffffffff}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000100)='\x00') ioctl$BLKTRACETEARDOWN(r1, 0x125f, 0x0) 01:48:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:48:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x0) 01:48:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 11) 01:48:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:48:58 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:48:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x25, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:58 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5608, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:48:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 1) 01:48:58 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5609, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1500.377146] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1500.384653] FAULT_INJECTION: forcing a failure. [ 1500.384653] name failslab, interval 1, probability 0, space 0, times 0 [ 1500.387863] CPU: 0 PID: 9172 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1500.389872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1500.392235] Call Trace: [ 1500.392978] dump_stack+0x107/0x167 [ 1500.393994] should_fail.cold+0x5/0xa 01:48:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x28, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1500.395078] ? xas_alloc+0x336/0x440 [ 1500.400196] should_failslab+0x5/0x20 [ 1500.401260] kmem_cache_alloc+0x5b/0x310 [ 1500.402406] ? try_charge+0x62c/0x1160 [ 1500.403511] xas_alloc+0x336/0x440 [ 1500.404518] xas_create+0x60f/0x10d0 [ 1500.405571] xas_store+0x8c/0x1c40 [ 1500.406579] ? xas_find_conflict+0x4b5/0xa70 [ 1500.415851] __add_to_page_cache_locked+0x708/0xc80 [ 1500.417277] ? file_write_and_wait_range+0x130/0x130 [ 1500.418708] ? memcg_drain_all_list_lrus+0x720/0x720 [ 1500.420166] ? find_get_entry+0x2c8/0x740 [ 1500.421325] ? lru_cache_add+0x45c/0x800 [ 1500.422475] add_to_page_cache_lru+0xe6/0x2e0 [ 1500.423755] ? add_to_page_cache_locked+0x40/0x40 [ 1500.425123] ? __page_cache_alloc+0x10d/0x360 [ 1500.426391] pagecache_get_page+0x38b/0xc80 [ 1500.427631] grab_cache_page_write_begin+0x64/0xa0 [ 1500.429013] ext4_move_extents+0x1224/0x3050 [ 1500.430288] ? lock_acquire+0x197/0x470 [ 1500.431422] ? lock_acquire+0x197/0x470 [ 1500.432547] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1500.434022] ? lock_release+0x680/0x680 [ 1500.439201] __ext4_ioctl+0x302e/0x4190 [ 1500.440329] ? ext4_reset_inode_seed+0x450/0x450 [ 1500.441677] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1500.443162] ? find_held_lock+0x2c/0x110 [ 1500.444373] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1500.445992] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1500.447467] ? do_vfs_ioctl+0x283/0x10d0 [ 1500.448611] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1500.450095] ? generic_block_fiemap+0x60/0x60 [ 1500.451369] ? lock_downgrade+0x6d0/0x6d0 [ 1500.452544] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1500.453901] ? wait_for_completion_io+0x270/0x270 [ 1500.455293] ? selinux_file_ioctl+0xb6/0x270 [ 1500.456527] ? __ext4_ioctl+0x4190/0x4190 [ 1500.457700] __x64_sys_ioctl+0x19a/0x210 [ 1500.458837] do_syscall_64+0x33/0x40 [ 1500.459903] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1500.461355] RIP: 0033:0x7fb08f3deb19 [ 1500.462406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1500.467684] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1500.469845] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1500.471883] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1500.473918] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1500.475964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1500.477999] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 [ 1500.482954] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 [ 1500.497574] FAULT_INJECTION: forcing a failure. [ 1500.497574] name failslab, interval 1, probability 0, space 0, times 0 [ 1500.500846] CPU: 0 PID: 9192 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1500.502782] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1500.505164] Call Trace: [ 1500.505897] dump_stack+0x107/0x167 [ 1500.506960] should_fail.cold+0x5/0xa [ 1500.512071] ? getname_flags.part.0+0x50/0x4f0 [ 1500.513370] should_failslab+0x5/0x20 01:48:59 executing program 2: r0 = syz_open_procfs(0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) flock(r0, 0xc) read(0xffffffffffffffff, &(0x7f0000002880)=""/196, 0xc4) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)={'L-', 0x1}, 0x16, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SURVEY(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x20000881) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/raw6\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000040)={0x401, 0x0, 0x0, 'queue1\x00'}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r3, 0x0, 0x0, 0x1000002) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r3, 0x0) [ 1500.514435] kmem_cache_alloc+0x5b/0x310 [ 1500.519670] getname_flags.part.0+0x50/0x4f0 [ 1500.520916] getname_flags+0x9a/0xe0 [ 1500.521962] do_mkdirat+0x8f/0x2b0 [ 1500.522968] ? user_path_create+0xf0/0xf0 [ 1500.524155] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1500.525645] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1500.527112] do_syscall_64+0x33/0x40 [ 1500.528170] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1500.529616] RIP: 0033:0x7f510ba9db19 [ 1500.530666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1500.535980] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1500.538141] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1500.540174] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1500.542205] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1500.544243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1500.546278] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:48:59 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:48:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x29, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:48:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x401, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:48:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:48:59 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x560a, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:48:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1500.701007] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1500.719074] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=9 01:49:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 2) 01:49:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x560a, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:49:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)) 01:49:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2b, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:49:13 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:49:13 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x560b, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:49:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x401, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:49:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 12) 01:49:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4ea0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000040)={0x1d, 0x15, '\x00', [@jumbo={0xc2, 0x4, 0x3dd1}, @pad1, @generic={0xff, 0x9f, "5d8c22a64808b99260c3192aaec85ec792980cc90dc0bd65adc5284fc44054a6efbe6129cceee9aaf75eb34d1ecdf121e5566c976ce10ec663a436fa3402d4925c49225f357f4692a91e73497e2e55825ca15bd25a9ff8f0de5d66bb6d842a839dc66007e6d2d865bfcff52c32ab27248b0e3a293ef47eee7c8a3a7160e765f5924c1eff3201d6f3421f083893eb0d3a7ba34c188cfceadced185448ce992d"}]}, 0xb8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r2, 0xb99771294b5ad721}, 0x14}}, 0x0) poll(&(0x7f0000000180)=[{r0, 0x1080}, {r1}], 0x2, 0xe6) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000140)=0x80000000, 0x4) stat(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 01:49:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2c, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1514.717844] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1514.728703] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=9 [ 1514.731502] FAULT_INJECTION: forcing a failure. [ 1514.731502] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1514.733107] CPU: 1 PID: 9238 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1514.733939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1514.734953] Call Trace: [ 1514.735309] dump_stack+0x107/0x167 [ 1514.739762] should_fail.cold+0x5/0xa [ 1514.740268] __alloc_pages_nodemask+0x182/0x600 [ 1514.740870] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1514.741649] ? kmem_cache_alloc+0x301/0x310 [ 1514.742214] alloc_pages_current+0x187/0x280 [ 1514.742772] allocate_slab+0x26f/0x380 [ 1514.743271] ___slab_alloc+0x470/0x700 [ 1514.743769] ? getname_flags.part.0+0x50/0x4f0 [ 1514.744330] ? ksys_write+0x21a/0x260 [ 1514.744799] ? getname_flags.part.0+0x50/0x4f0 [ 1514.745356] ? kmem_cache_alloc+0x301/0x310 [ 1514.745880] kmem_cache_alloc+0x301/0x310 [ 1514.746387] getname_flags.part.0+0x50/0x4f0 [ 1514.746927] getname_flags+0x9a/0xe0 [ 1514.747381] do_mkdirat+0x8f/0x2b0 [ 1514.747833] ? user_path_create+0xf0/0xf0 [ 1514.748341] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1514.748982] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1514.749610] do_syscall_64+0x33/0x40 [ 1514.750065] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1514.750689] RIP: 0033:0x7f510ba9db19 [ 1514.751145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1514.753405] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1514.754333] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1514.755202] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1514.756091] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1514.756962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1514.757831] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:49:13 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x560c, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1514.800652] FAULT_INJECTION: forcing a failure. [ 1514.800652] name failslab, interval 1, probability 0, space 0, times 0 [ 1514.802334] CPU: 1 PID: 9239 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1514.803168] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1514.804210] Call Trace: [ 1514.804536] dump_stack+0x107/0x167 [ 1514.804983] should_fail.cold+0x5/0xa [ 1514.805451] ? ext4_find_extent+0xa77/0xd70 [ 1514.805988] should_failslab+0x5/0x20 [ 1514.806455] __kmalloc+0x72/0x390 [ 1514.806884] ext4_find_extent+0xa77/0xd70 [ 1514.807397] ? add_to_page_cache_locked+0x40/0x40 [ 1514.808018] mext_check_coverage.constprop.0+0x223/0x3e0 [ 1514.808686] ? ext4_multi_mount_protect+0xab0/0xab0 [ 1514.809299] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1514.809925] ? wait_on_page_writeback+0xb9/0x240 [ 1514.810506] ext4_move_extents+0x12e0/0x3050 [ 1514.811076] ? lock_acquire+0x197/0x470 [ 1514.811570] ? lock_acquire+0x197/0x470 [ 1514.812075] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1514.812721] ? lock_release+0x680/0x680 [ 1514.813230] __ext4_ioctl+0x302e/0x4190 [ 1514.813730] ? ext4_reset_inode_seed+0x450/0x450 [ 1514.814315] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1514.814960] ? find_held_lock+0x2c/0x110 [ 1514.815473] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1514.816197] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1514.816830] ? do_vfs_ioctl+0x283/0x10d0 [ 1514.817328] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1514.817969] ? generic_block_fiemap+0x60/0x60 [ 1514.818518] ? lock_downgrade+0x6d0/0x6d0 [ 1514.819034] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1514.819641] ? wait_for_completion_io+0x270/0x270 [ 1514.820247] ? selinux_file_ioctl+0xb6/0x270 [ 1514.820789] ? __ext4_ioctl+0x4190/0x4190 [ 1514.821297] __x64_sys_ioctl+0x19a/0x210 [ 1514.821803] do_syscall_64+0x33/0x40 [ 1514.822259] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1514.822889] RIP: 0033:0x7fb08f3deb19 [ 1514.823345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1514.825607] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1514.826539] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1514.827416] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1514.828300] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1514.829174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1514.830045] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:49:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)) 01:49:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x401, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:49:26 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:49:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 3) 01:49:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2d, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:49:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 13) 01:49:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x560d, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:49:26 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x40000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) ftruncate(0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000600)) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fcdbdf251d00238008001a0002000000080017000300000006001b0080000000060400000008001a000300000005000e0003000000082003005988cd64f7de11468d4eb9d9721710fdd67b00000000000000", @ANYRES32, @ANYBLOB="0c009900060000001b0000000c009900b7080000790000000c002380050005000a0000001c002380060010000300000008001500fb0000000500110000000000"], 0xa4}, 0x1, 0x0, 0x0, 0x10000015}, 0x8000) sendmsg$NL80211_CMD_ADD_TX_TS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x60, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x20}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xe}, @NL80211_ATTR_ADMITTED_TIME={0x6}, @NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x2}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x9}]}, 0x60}, 0x1, 0x0, 0x0, 0x4040004}, 0x40) fcntl$setstatus(r3, 0x4, 0x42800) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r4, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r5, 0xb99771294b5ad721}, 0x14}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000140)=ANY=[@ANYBLOB="01485eb6a9410211d800000050d45bfb24e4a85785f9c8bea0a5386198ff693b6114c1b66a881fc1dcb5ac273a59f676206ca7e0", @ANYRES32=r4, @ANYBLOB="01000000000000002e2f66696c653100"]) sendfile(r1, r2, 0x0, 0x100000001) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) [ 1528.005826] FAULT_INJECTION: forcing a failure. [ 1528.005826] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.007239] CPU: 1 PID: 9273 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1528.008067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.010881] Call Trace: [ 1528.011211] dump_stack+0x107/0x167 [ 1528.011656] should_fail.cold+0x5/0xa [ 1528.012125] ? ext4_find_extent+0xa77/0xd70 [ 1528.012680] should_failslab+0x5/0x20 [ 1528.013147] __kmalloc+0x72/0x390 [ 1528.013574] ext4_find_extent+0xa77/0xd70 [ 1528.014087] ? add_to_page_cache_locked+0x40/0x40 [ 1528.014684] mext_check_coverage.constprop.0+0x223/0x3e0 [ 1528.015350] ? ext4_multi_mount_protect+0xab0/0xab0 [ 1528.015966] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1528.016602] ? wait_on_page_writeback+0xb9/0x240 [ 1528.017185] ext4_move_extents+0x12e0/0x3050 [ 1528.017747] ? lock_acquire+0x197/0x470 [ 1528.018242] ? lock_acquire+0x197/0x470 [ 1528.018730] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1528.019375] ? lock_release+0x680/0x680 [ 1528.019884] __ext4_ioctl+0x302e/0x4190 [ 1528.020395] ? ext4_reset_inode_seed+0x450/0x450 [ 1528.020978] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1528.021618] ? find_held_lock+0x2c/0x110 [ 1528.022131] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1528.022833] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1528.023464] ? do_vfs_ioctl+0x283/0x10d0 [ 1528.023959] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1528.024609] ? generic_block_fiemap+0x60/0x60 [ 1528.025162] ? lock_downgrade+0x6d0/0x6d0 [ 1528.025672] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1528.026263] ? wait_for_completion_io+0x270/0x270 [ 1528.026858] ? selinux_file_ioctl+0xb6/0x270 [ 1528.027398] ? __ext4_ioctl+0x4190/0x4190 [ 1528.027906] __x64_sys_ioctl+0x19a/0x210 [ 1528.028419] do_syscall_64+0x33/0x40 [ 1528.028875] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.029499] RIP: 0033:0x7fb08f3deb19 [ 1528.029955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.032208] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1528.033138] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1528.034011] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1528.034877] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 01:49:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2e, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:49:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x560e, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1528.035745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.036630] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 [ 1528.042578] FAULT_INJECTION: forcing a failure. [ 1528.042578] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1528.044078] CPU: 0 PID: 9278 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1528.044995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.046019] Call Trace: [ 1528.046375] dump_stack+0x107/0x167 [ 1528.046820] should_fail.cold+0x5/0xa [ 1528.047314] strncpy_from_user+0x34/0x470 [ 1528.047824] getname_flags.part.0+0x95/0x4f0 [ 1528.060382] getname_flags+0x9a/0xe0 [ 1528.060841] do_mkdirat+0x8f/0x2b0 [ 1528.061308] ? user_path_create+0xf0/0xf0 [ 1528.061818] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1528.062486] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.063127] do_syscall_64+0x33/0x40 [ 1528.063603] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.064274] RIP: 0033:0x7f510ba9db19 [ 1528.064730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.067016] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1528.067981] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1528.068888] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1528.069782] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.070673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1528.071568] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:49:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 14) [ 1528.113804] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:49:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:49:26 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1528.197845] FAULT_INJECTION: forcing a failure. [ 1528.197845] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.199311] CPU: 1 PID: 9298 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1528.200153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.202597] Call Trace: [ 1528.203227] dump_stack+0x107/0x167 [ 1528.204101] should_fail.cold+0x5/0xa [ 1528.209247] ? ext4_find_extent+0xa77/0xd70 [ 1528.210289] should_failslab+0x5/0x20 [ 1528.211205] __kmalloc+0x72/0x390 [ 1528.212038] ext4_find_extent+0xa77/0xd70 [ 1528.213252] mext_check_coverage.constprop.0+0x223/0x3e0 [ 1528.214563] ? ext4_multi_mount_protect+0xab0/0xab0 [ 1528.215768] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1528.216605] ? wait_on_page_writeback+0xb9/0x240 [ 1528.217194] ext4_move_extents+0x131b/0x3050 [ 1528.217760] ? lock_acquire+0x197/0x470 [ 1528.218255] ? lock_acquire+0x197/0x470 [ 1528.218744] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1528.219390] ? lock_release+0x680/0x680 [ 1528.219900] __ext4_ioctl+0x302e/0x4190 [ 1528.220758] ? ext4_reset_inode_seed+0x450/0x450 [ 1528.221901] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1528.223166] ? find_held_lock+0x2c/0x110 [ 1528.224203] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 01:49:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)) [ 1528.225847] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1528.233417] ? do_vfs_ioctl+0x283/0x10d0 [ 1528.234392] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1528.235654] ? generic_block_fiemap+0x60/0x60 [ 1528.236846] ? lock_downgrade+0x6d0/0x6d0 [ 1528.237847] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1528.239009] ? wait_for_completion_io+0x270/0x270 [ 1528.240213] ? selinux_file_ioctl+0xb6/0x270 [ 1528.241463] ? __ext4_ioctl+0x4190/0x4190 [ 1528.242462] __x64_sys_ioctl+0x19a/0x210 [ 1528.243439] do_syscall_64+0x33/0x40 [ 1528.244270] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.244900] RIP: 0033:0x7fb08f3deb19 [ 1528.245364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.247615] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1528.249108] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 01:49:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 4) 01:49:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2f, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1528.250831] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1528.256641] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.258371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.260099] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:49:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x560f, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:49:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 15) 01:49:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x40049409, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:49:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x31, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1528.425704] FAULT_INJECTION: forcing a failure. [ 1528.425704] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.430185] CPU: 1 PID: 9311 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1528.431999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.434656] Call Trace: [ 1528.435375] dump_stack+0x107/0x167 [ 1528.436420] should_fail.cold+0x5/0xa [ 1528.437418] ? __d_alloc+0x2a/0x990 [ 1528.438375] should_failslab+0x5/0x20 [ 1528.439362] kmem_cache_alloc+0x5b/0x310 [ 1528.440445] __d_alloc+0x2a/0x990 [ 1528.441329] ? dput+0x1ae/0xcd0 [ 1528.442130] d_alloc+0x46/0x1c0 [ 1528.442995] __lookup_hash+0xcc/0x190 [ 1528.443975] filename_create+0x186/0x4a0 [ 1528.444631] ? filename_parentat+0x570/0x570 [ 1528.445172] ? getname_flags.part.0+0x1dd/0x4f0 [ 1528.445795] do_mkdirat+0xa2/0x2b0 [ 1528.446295] ? user_path_create+0xf0/0xf0 [ 1528.446818] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1528.447513] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.448156] do_syscall_64+0x33/0x40 [ 1528.448666] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.449340] RIP: 0033:0x7f510ba9db19 [ 1528.449804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.452175] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1528.453155] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1528.454070] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1528.455013] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.455933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1528.456868] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1528.493301] FAULT_INJECTION: forcing a failure. [ 1528.493301] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.494905] CPU: 0 PID: 9318 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1528.495791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.496866] Call Trace: [ 1528.497194] dump_stack+0x107/0x167 [ 1528.497694] should_fail.cold+0x5/0xa [ 1528.498164] ? create_object.isra.0+0x3a/0xa20 [ 1528.498808] should_failslab+0x5/0x20 [ 1528.499274] kmem_cache_alloc+0x5b/0x310 [ 1528.499837] ? lock_downgrade+0x6d0/0x6d0 [ 1528.500414] create_object.isra.0+0x3a/0xa20 [ 1528.501000] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1528.501682] __kmalloc+0x16e/0x390 [ 1528.502126] ext4_find_extent+0xa77/0xd70 [ 1528.502714] ? add_to_page_cache_locked+0x40/0x40 [ 1528.503313] mext_check_coverage.constprop.0+0x223/0x3e0 [ 1528.504035] ? ext4_multi_mount_protect+0xab0/0xab0 [ 1528.504729] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1528.505355] ? wait_on_page_writeback+0xb9/0x240 [ 1528.505991] ext4_move_extents+0x12e0/0x3050 [ 1528.506554] ? lock_acquire+0x197/0x470 [ 1528.507119] ? lock_acquire+0x197/0x470 [ 1528.507660] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1528.508335] ? lock_release+0x680/0x680 [ 1528.508891] __ext4_ioctl+0x302e/0x4190 [ 1528.509389] ? ext4_reset_inode_seed+0x450/0x450 [ 1528.510021] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1528.510738] ? find_held_lock+0x2c/0x110 [ 1528.511251] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1528.512009] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1528.512717] ? do_vfs_ioctl+0x283/0x10d0 [ 1528.513213] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1528.513903] ? generic_block_fiemap+0x60/0x60 [ 1528.514452] ? lock_downgrade+0x6d0/0x6d0 [ 1528.515036] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1528.515690] ? wait_for_completion_io+0x270/0x270 [ 1528.516304] ? selinux_file_ioctl+0xb6/0x270 [ 1528.516896] ? __ext4_ioctl+0x4190/0x4190 [ 1528.517406] __x64_sys_ioctl+0x19a/0x210 [ 1528.517958] do_syscall_64+0x33/0x40 [ 1528.518416] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.519109] RIP: 0033:0x7fb08f3deb19 [ 1528.519565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.521960] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1528.522963] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1528.523886] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1528.524832] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.525758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.526705] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:49:40 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x4}], 0x0, &(0x7f0000000140)=ANY=[]) openat(r0, &(0x7f0000000000)='./file0\x00', 0x20000, 0x113) 01:49:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 16) 01:49:40 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0}) 01:49:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:49:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x32, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:49:40 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x40086602, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:49:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 5) 01:49:40 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1542.071466] FAULT_INJECTION: forcing a failure. 01:49:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1542.071466] name failslab, interval 1, probability 0, space 0, times 0 [ 1542.073015] CPU: 1 PID: 9331 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1542.073848] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1542.074858] Call Trace: [ 1542.075185] dump_stack+0x107/0x167 [ 1542.075629] should_fail.cold+0x5/0xa [ 1542.076097] ? create_object.isra.0+0x3a/0xa20 [ 1542.076656] should_failslab+0x5/0x20 [ 1542.077155] kmem_cache_alloc+0x5b/0x310 [ 1542.077652] create_object.isra.0+0x3a/0xa20 [ 1542.078183] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1542.078803] kmem_cache_alloc+0x159/0x310 [ 1542.079309] __d_alloc+0x2a/0x990 [ 1542.079733] ? dput+0x1ae/0xcd0 [ 1542.080141] d_alloc+0x46/0x1c0 [ 1542.080546] __lookup_hash+0xcc/0x190 [ 1542.081055] filename_create+0x186/0x4a0 [ 1542.081552] ? filename_parentat+0x570/0x570 [ 1542.082092] ? getname_flags.part.0+0x1dd/0x4f0 [ 1542.082668] do_mkdirat+0xa2/0x2b0 [ 1542.083106] ? user_path_create+0xf0/0xf0 [ 1542.083618] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1542.084262] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1542.088923] do_syscall_64+0x33/0x40 [ 1542.089381] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1542.090003] RIP: 0033:0x7f510ba9db19 [ 1542.090459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1542.092716] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1542.093652] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1542.094520] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1542.095385] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1542.096251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1542.097180] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:49:40 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x40087602, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1542.138039] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1542.139574] EXT4-fs (loop1): inodes count not valid: 65535 vs 32 [ 1542.167791] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1542.168981] EXT4-fs (loop2): group descriptors corrupted! [ 1542.174719] FAULT_INJECTION: forcing a failure. [ 1542.174719] name failslab, interval 1, probability 0, space 0, times 0 [ 1542.177099] CPU: 0 PID: 9343 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1542.177943] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1542.178957] Call Trace: [ 1542.179290] dump_stack+0x107/0x167 [ 1542.179742] should_fail.cold+0x5/0xa [ 1542.180220] ? __es_insert_extent+0xed1/0x1370 [ 1542.180806] should_failslab+0x5/0x20 [ 1542.181277] kmem_cache_alloc+0x5b/0x310 [ 1542.181781] __es_insert_extent+0xed1/0x1370 [ 1542.182328] ? __es_tree_search.isra.0+0x1af/0x220 [ 1542.182932] __es_remove_extent+0x72d/0x1560 [ 1542.183479] ? count_rsvd.isra.0+0x540/0x540 [ 1542.184022] ? lock_release+0x680/0x680 [ 1542.184509] ? ext4_es_remove_extent+0x2f2/0x450 [ 1542.185112] ? do_raw_write_lock+0x11a/0x280 [ 1542.185649] ? do_raw_read_unlock+0x70/0x70 [ 1542.186188] ext4_es_remove_extent+0x2e3/0x450 [ 1542.186750] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 1542.187339] ? __kasan_slab_free+0x122/0x160 [ 1542.187883] ext4_swap_extents+0x283/0x14c0 [ 1542.188411] ? mext_check_coverage.constprop.0+0x2a7/0x3e0 [ 1542.189108] ? kfree+0xd7/0x340 [ 1542.189521] ? ext4_get_es_cache+0x600/0x600 [ 1542.190064] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1542.190692] ext4_move_extents+0x2559/0x3050 [ 1542.191260] ? lock_acquire+0x197/0x470 [ 1542.191755] ? lock_acquire+0x197/0x470 [ 1542.192245] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1542.192904] ? lock_release+0x680/0x680 [ 1542.193413] __ext4_ioctl+0x302e/0x4190 [ 1542.193910] ? ext4_reset_inode_seed+0x450/0x450 [ 1542.194494] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1542.195139] ? find_held_lock+0x2c/0x110 [ 1542.195652] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1542.196353] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1542.197008] ? do_vfs_ioctl+0x283/0x10d0 [ 1542.197504] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1542.198147] ? generic_block_fiemap+0x60/0x60 [ 1542.198694] ? lock_downgrade+0x6d0/0x6d0 [ 1542.199207] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1542.199804] ? wait_for_completion_io+0x270/0x270 [ 1542.200401] ? selinux_file_ioctl+0xb6/0x270 [ 1542.200976] ? __ext4_ioctl+0x4190/0x4190 [ 1542.201487] __x64_sys_ioctl+0x19a/0x210 [ 1542.201986] do_syscall_64+0x33/0x40 [ 1542.202442] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1542.203076] RIP: 0033:0x7fb08f3deb19 [ 1542.203533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1542.205797] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1542.206731] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1542.207601] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1542.208472] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1542.209356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1542.210228] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 [ 1542.246444] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1542.248120] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1542.249306] EXT4-fs (loop2): group descriptors corrupted! 01:49:53 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:49:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x72, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x6, 0x8001, 0x1, 0x32b9}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x4c080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xfc, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0xfffe, 0x40b, 0x7, 0x7f}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000300)) flistxattr(r1, &(0x7f0000000140)=""/15, 0xf) syz_open_dev$evdev(&(0x7f0000000440), 0x1, 0x8000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) mmap$IORING_OFF_SQES(&(0x7f00007fd000/0x800000)=nil, 0x800000, 0x9, 0x12, 0xffffffffffffffff, 0x10000000) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x40, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x2000, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4635, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0xf194, 0xffffffffffffffff, 0x1, 0x4, 0x474, 0xffff, 0x6, 0x0, 0x100, 0x0, 0x3ff}, r5, 0x4, 0xffffffffffffffff, 0x7352e652358dbec8) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x39b) keyctl$restrict_keyring(0x1d, r4, 0x0, 0x0) 01:49:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:49:53 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0}) 01:49:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x34, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:49:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 6) 01:49:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 17) 01:49:53 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x4020940d, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1555.456607] EXT4-fs (loop1): inodes count not valid: 65535 vs 32 01:49:54 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:49:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x35, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1555.523079] FAULT_INJECTION: forcing a failure. [ 1555.523079] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.525449] CPU: 1 PID: 9385 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1555.526290] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.527303] Call Trace: [ 1555.527634] dump_stack+0x107/0x167 [ 1555.528082] should_fail.cold+0x5/0xa [ 1555.528554] ? cgroup_mkdir+0x254/0xf50 [ 1555.529046] should_failslab+0x5/0x20 [ 1555.529538] __kmalloc+0x72/0x390 [ 1555.529968] cgroup_mkdir+0x254/0xf50 [ 1555.530439] ? cgroup_destroy_locked+0x710/0x710 [ 1555.531020] kernfs_iop_mkdir+0x14d/0x1e0 [ 1555.531530] vfs_mkdir+0x493/0x750 [ 1555.531966] do_mkdirat+0x150/0x2b0 [ 1555.532413] ? user_path_create+0xf0/0xf0 [ 1555.532925] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1555.533593] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1555.534226] do_syscall_64+0x33/0x40 [ 1555.534683] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.535312] RIP: 0033:0x7f510ba9db19 [ 1555.535767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.542040] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1555.542969] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1555.543837] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1555.544704] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.545594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1555.546462] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:49:54 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x402c542b, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1555.574020] FAULT_INJECTION: forcing a failure. [ 1555.574020] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.575491] CPU: 0 PID: 9398 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1555.576323] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.577346] Call Trace: [ 1555.577674] dump_stack+0x107/0x167 [ 1555.578121] should_fail.cold+0x5/0xa [ 1555.578597] ? create_object.isra.0+0x3a/0xa20 [ 1555.579160] should_failslab+0x5/0x20 [ 1555.579628] kmem_cache_alloc+0x5b/0x310 [ 1555.580128] ? arch_stack_walk+0x99/0xf0 [ 1555.580630] create_object.isra.0+0x3a/0xa20 [ 1555.581166] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1555.581807] kmem_cache_alloc+0x159/0x310 [ 1555.582343] __es_insert_extent+0xed1/0x1370 [ 1555.582917] ? __es_tree_search.isra.0+0x1af/0x220 [ 1555.583519] __es_remove_extent+0x72d/0x1560 [ 1555.584063] ? count_rsvd.isra.0+0x540/0x540 [ 1555.584604] ? lock_release+0x680/0x680 [ 1555.585088] ? ext4_es_remove_extent+0x2f2/0x450 [ 1555.585684] ? do_raw_write_lock+0x11a/0x280 [ 1555.586221] ? do_raw_read_unlock+0x70/0x70 [ 1555.586756] ext4_es_remove_extent+0x2e3/0x450 [ 1555.587316] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 1555.587897] ? __kasan_slab_free+0x122/0x160 [ 1555.588439] ext4_swap_extents+0x283/0x14c0 [ 1555.588968] ? mext_check_coverage.constprop.0+0x2a7/0x3e0 [ 1555.589666] ? kfree+0xd7/0x340 [ 1555.590079] ? ext4_get_es_cache+0x600/0x600 [ 1555.590620] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1555.591248] ext4_move_extents+0x2559/0x3050 [ 1555.591810] ? lock_acquire+0x197/0x470 [ 1555.592305] ? lock_acquire+0x197/0x470 [ 1555.592792] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1555.597470] ? lock_release+0x680/0x680 [ 1555.597977] __ext4_ioctl+0x302e/0x4190 [ 1555.598472] ? ext4_reset_inode_seed+0x450/0x450 [ 1555.599051] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1555.599692] ? find_held_lock+0x2c/0x110 [ 1555.600209] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1555.600918] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1555.601575] ? do_vfs_ioctl+0x283/0x10d0 [ 1555.602070] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1555.602706] ? generic_block_fiemap+0x60/0x60 [ 1555.603251] ? lock_downgrade+0x6d0/0x6d0 [ 1555.603759] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1555.604349] ? wait_for_completion_io+0x270/0x270 [ 1555.604943] ? selinux_file_ioctl+0xb6/0x270 [ 1555.605505] ? __ext4_ioctl+0x4190/0x4190 [ 1555.606036] __x64_sys_ioctl+0x19a/0x210 [ 1555.606560] do_syscall_64+0x33/0x40 [ 1555.607035] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.607686] RIP: 0033:0x7fb08f3deb19 [ 1555.608162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.610451] RSP: 002b:00007fb08c933188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1555.611381] RAX: ffffffffffffffda RBX: 00007fb08f4f2020 RCX: 00007fb08f3deb19 [ 1555.612249] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1555.613119] RBP: 00007fb08c9331d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.614000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1555.614867] R13: 00007ffe741e591f R14: 00007fb08c933300 R15: 0000000000022000 01:49:54 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) getdents64(r0, &(0x7f00000000c0)=""/28, 0x1c) getdents64(r0, &(0x7f00000014c0)=""/124, 0x7c) fcntl$setlease(r0, 0x400, 0x1) 01:49:54 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0}) 01:49:54 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x402c542c, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:49:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:49:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:49:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 7) 01:49:54 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:49:54 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0xfd, 0xf9, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) r1 = semget$private(0x0, 0x6, 0x0) semop(r1, &(0x7f0000000080)=[{}, {}], 0x2) semop(0x0, &(0x7f0000000000)=[{0x4, 0xfff}], 0x1) r2 = semget$private(0x0, 0x6, 0x0) semctl$IPC_RMID(r2, 0x0, 0x0) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_RMID(r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180)={0x0, 0x0, 0x0}, &(0x7f00000011c0)=0xc) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000001200)={{0x0, 0xee01, r3, 0xffffffffffffffff, r5, 0x4, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f}) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000001e00)=""/4109) stat(&(0x7f0000000100)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) setresuid(r6, r4, r4) semctl$IPC_RMID(r1, 0x0, 0x0) semop(r2, &(0x7f0000000040), 0x2aaaaaaaaaaaab3e) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) [ 1555.725839] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1555.727026] EXT4-fs (loop1): group descriptors corrupted! 01:49:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x3d, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:49:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 18) [ 1555.763003] FAULT_INJECTION: forcing a failure. [ 1555.763003] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.765008] CPU: 0 PID: 9410 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1555.769868] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.770867] Call Trace: [ 1555.771192] dump_stack+0x107/0x167 [ 1555.771635] should_fail.cold+0x5/0xa [ 1555.772108] ? create_object.isra.0+0x3a/0xa20 [ 1555.772668] should_failslab+0x5/0x20 [ 1555.773133] kmem_cache_alloc+0x5b/0x310 [ 1555.773648] ? selinux_determine_inode_label+0x1ab/0x340 [ 1555.774309] create_object.isra.0+0x3a/0xa20 [ 1555.774844] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1555.775464] __kmalloc+0x16e/0x390 [ 1555.775905] cgroup_mkdir+0x254/0xf50 [ 1555.776374] ? cgroup_destroy_locked+0x710/0x710 [ 1555.776951] kernfs_iop_mkdir+0x14d/0x1e0 [ 1555.777474] vfs_mkdir+0x493/0x750 [ 1555.777910] do_mkdirat+0x150/0x2b0 [ 1555.778354] ? user_path_create+0xf0/0xf0 [ 1555.778864] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1555.779502] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1555.780134] do_syscall_64+0x33/0x40 [ 1555.780588] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.781225] RIP: 0033:0x7f510ba9db19 [ 1555.781686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.783929] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1555.784858] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1555.785741] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1555.786612] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.787481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1555.788348] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1555.874068] FAULT_INJECTION: forcing a failure. [ 1555.874068] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.875459] CPU: 0 PID: 9425 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1555.876288] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.877313] Call Trace: [ 1555.877642] dump_stack+0x107/0x167 [ 1555.878088] should_fail.cold+0x5/0xa [ 1555.878555] ? ext4_find_extent+0xa77/0xd70 [ 1555.879091] should_failslab+0x5/0x20 [ 1555.879560] __kmalloc+0x72/0x390 [ 1555.879989] ext4_find_extent+0xa77/0xd70 [ 1555.880508] ext4_swap_extents+0x321/0x14c0 [ 1555.881038] ? mext_check_coverage.constprop.0+0x2a7/0x3e0 [ 1555.881738] ? kfree+0xd7/0x340 [ 1555.882157] ? ext4_get_es_cache+0x600/0x600 [ 1555.882702] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1555.883332] ext4_move_extents+0x2559/0x3050 [ 1555.883896] ? lock_acquire+0x197/0x470 [ 1555.884391] ? lock_acquire+0x197/0x470 [ 1555.884878] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1555.885541] ? lock_release+0x680/0x680 [ 1555.886050] __ext4_ioctl+0x302e/0x4190 [ 1555.886547] ? ext4_reset_inode_seed+0x450/0x450 [ 1555.887128] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1555.887772] ? find_held_lock+0x2c/0x110 [ 1555.888285] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1555.888989] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1555.889638] ? do_vfs_ioctl+0x283/0x10d0 [ 1555.890130] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1555.890766] ? generic_block_fiemap+0x60/0x60 [ 1555.891309] ? lock_downgrade+0x6d0/0x6d0 [ 1555.891815] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1555.892408] ? wait_for_completion_io+0x270/0x270 [ 1555.893000] ? selinux_file_ioctl+0xb6/0x270 [ 1555.893552] ? __ext4_ioctl+0x4190/0x4190 [ 1555.894059] __x64_sys_ioctl+0x19a/0x210 [ 1555.894555] do_syscall_64+0x33/0x40 [ 1555.895013] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.895633] RIP: 0033:0x7fb08f3deb19 [ 1555.896087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.898342] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1555.899269] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1555.900136] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1555.901005] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.901890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1555.902757] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:50:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x402c542d, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:50:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 19) 01:50:07 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:50:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 8) 01:50:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:50:07 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:50:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r2, 0xb99771294b5ad721}, 0x14}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a00000d2bbd7000000000001500000064c22986aa2e7def5e136b9ed56b5acc260d9117918f07cb972abed21987e6aa133245261dd30a5231b476451b9fef6b093759c2eddcb460f8943ac597640b76f0c387ed5e0ff1f40d84769d52b9c25cd50ab5df82dcf248a028826614ec48678c79a6ae4534c9088a19bbfffa2bba1f3ed08feeaccd12e1754c9abd960222cca2"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) 01:50:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x3e, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:50:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x41, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:50:07 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xf) r1 = creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000fffffdfd0201000000000000000000000000000000000000000010000000000000000000"]) bind(r0, &(0x7f00000002c0)=@can, 0x80) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x40000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) ftruncate(0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00./fi?\x001\x00']) ftruncate(r5, 0x6914) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='syscall\x00') fstat(r0, &(0x7f0000000140)) sendfile(r3, r4, 0x0, 0x100000001) [ 1568.999546] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1569.000807] EXT4-fs (loop1): group descriptors corrupted! [ 1569.027210] FAULT_INJECTION: forcing a failure. [ 1569.027210] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.028637] CPU: 1 PID: 9448 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1569.029482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.034534] Call Trace: [ 1569.034883] dump_stack+0x107/0x167 [ 1569.035343] should_fail.cold+0x5/0xa [ 1569.035834] ? create_object.isra.0+0x3a/0xa20 [ 1569.036416] should_failslab+0x5/0x20 [ 1569.036897] kmem_cache_alloc+0x5b/0x310 [ 1569.037425] create_object.isra.0+0x3a/0xa20 [ 1569.038017] kmemleak_alloc_percpu+0xa0/0x100 [ 1569.038583] pcpu_alloc+0x4e2/0x1240 [ 1569.039049] ? cset_cgroup_from_root+0x220/0x220 [ 1569.039626] percpu_ref_init+0x31/0x3d0 [ 1569.040121] cgroup_mkdir+0x28b/0xf50 [ 1569.040588] ? cgroup_destroy_locked+0x710/0x710 [ 1569.041169] kernfs_iop_mkdir+0x14d/0x1e0 [ 1569.041676] vfs_mkdir+0x493/0x750 [ 1569.046131] do_mkdirat+0x150/0x2b0 [ 1569.046578] ? user_path_create+0xf0/0xf0 [ 1569.047089] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1569.047727] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1569.048354] do_syscall_64+0x33/0x40 [ 1569.048808] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.049428] RIP: 0033:0x7f510ba9db19 [ 1569.053907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.056152] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1569.057080] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1569.057967] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1569.058834] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.059702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.060570] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:50:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x80045432, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:50:07 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1569.118856] FAULT_INJECTION: forcing a failure. [ 1569.118856] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.120285] CPU: 0 PID: 9441 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1569.121117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.122143] Call Trace: [ 1569.122478] dump_stack+0x107/0x167 [ 1569.122927] should_fail.cold+0x5/0xa [ 1569.123397] ? create_object.isra.0+0x3a/0xa20 [ 1569.123957] should_failslab+0x5/0x20 [ 1569.124424] kmem_cache_alloc+0x5b/0x310 [ 1569.124924] create_object.isra.0+0x3a/0xa20 [ 1569.125462] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1569.126126] __kmalloc+0x16e/0x390 [ 1569.126565] ext4_find_extent+0xa77/0xd70 [ 1569.127082] ext4_swap_extents+0x321/0x14c0 [ 1569.127610] ? mext_check_coverage.constprop.0+0x2a7/0x3e0 [ 1569.128293] ? kfree+0xd7/0x340 [ 1569.128708] ? ext4_get_es_cache+0x600/0x600 [ 1569.129254] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1569.129901] ext4_move_extents+0x2559/0x3050 [ 1569.130467] ? lock_acquire+0x197/0x470 [ 1569.130962] ? lock_acquire+0x197/0x470 [ 1569.131457] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1569.132102] ? lock_release+0x680/0x680 [ 1569.132611] __ext4_ioctl+0x302e/0x4190 [ 1569.133108] ? ext4_reset_inode_seed+0x450/0x450 [ 1569.133692] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1569.134351] ? find_held_lock+0x2c/0x110 [ 1569.134865] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1569.135570] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1569.136205] ? do_vfs_ioctl+0x283/0x10d0 [ 1569.136705] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1569.137347] ? generic_block_fiemap+0x60/0x60 [ 1569.137914] ? lock_downgrade+0x6d0/0x6d0 [ 1569.138428] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1569.139027] ? wait_for_completion_io+0x270/0x270 [ 1569.139627] ? selinux_file_ioctl+0xb6/0x270 [ 1569.140171] ? __ext4_ioctl+0x4190/0x4190 [ 1569.140682] __x64_sys_ioctl+0x19a/0x210 [ 1569.141183] do_syscall_64+0x33/0x40 [ 1569.141646] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.142291] RIP: 0033:0x7fb08f3deb19 [ 1569.142751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.145014] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1569.145964] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1569.146842] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1569.147716] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.148592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1569.149469] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:50:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x42, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:50:21 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x80045440, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:50:21 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) dup2(r0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000000c0)={0x38, r2, 0x201, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}, @NL80211_ATTR_IFNAME={0x14}]}, 0x38}}, 0x0) 01:50:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 20) 01:50:21 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:50:21 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:50:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:50:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 9) 01:50:21 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x80086601, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:50:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x43, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1583.079339] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1583.080653] EXT4-fs (loop1): group descriptors corrupted! 01:50:21 executing program 2: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init() r2 = syz_open_dev$vcsa(&(0x7f0000000d40), 0xfffffffffffffff8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) io_setup(0x283, &(0x7f0000000000)=0x0) r4 = dup2(r1, 0xffffffffffffffff) r5 = openat$cgroup(r4, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) poll(&(0x7f00000000c0)=[{r1, 0x200}, {r5, 0x40}, {r0, 0x200}], 0x3, 0xfffff717) r6 = syz_mount_image$nfs4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x9, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000b40)="ac6357fb7aa95daf3bdde019718c9ccbc53098f02f4d02c85c165ca0817d81ac37313c6dadee9e7ff7ba1613d894b2bd4f8b25066e1f7d2f17d8f3e601558aaec5af239e6a3a1f90cde546bef774b93e16b5ddb929a96fbad750af2ecf51e8f152cb7b592f62acf1d2a884301f89b9926274bb89833a6bdcbf1f3fb21dbb20b077ca9230a88e", 0x86, 0x6}, {&(0x7f0000001e00)="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", 0x1000, 0x4}], 0x14, &(0x7f0000000c00)={[{':'}, {'\xd0&'}, {'#'}, {'syz0\x00'}, {'\xf2yz0\x00'}, {'-'}, {':-^'}, {'syz0\x00'}], [{@subj_type={'subj_type', 0x3d, '+'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fowner_lt}, {@smackfsroot={'smackfsroot', 0x3d, 'syz0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfshat}]}) r7 = geteuid() statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x77baea28dc8b509d, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r8, r9, 0x1000) fchown(r6, r7, r9) io_submit(r3, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) r10 = syz_open_dev$vcsn(&(0x7f0000000180), 0x3ff, 0x80001) write$binfmt_elf64(r10, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/2186], 0x88a) ioctl$sock_inet6_SIOCSIFDSTADDR(r10, 0x8918, &(0x7f0000000cc0)={@remote, 0x3}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)) 01:50:21 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:50:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x44, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1583.113277] FAULT_INJECTION: forcing a failure. [ 1583.113277] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.114762] CPU: 1 PID: 9489 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1583.115613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1583.116652] Call Trace: [ 1583.116993] dump_stack+0x107/0x167 [ 1583.117457] should_fail.cold+0x5/0xa [ 1583.117954] ? create_object.isra.0+0x3a/0xa20 [ 1583.118565] should_failslab+0x5/0x20 [ 1583.119054] kmem_cache_alloc+0x5b/0x310 [ 1583.119557] ? mark_held_locks+0x9e/0xe0 [ 1583.120063] create_object.isra.0+0x3a/0xa20 [ 1583.120627] kmemleak_alloc_percpu+0xa0/0x100 [ 1583.121198] pcpu_alloc+0x4e2/0x1240 [ 1583.121687] ? cset_cgroup_from_root+0x220/0x220 [ 1583.126319] percpu_ref_init+0x31/0x3d0 [ 1583.126829] cgroup_mkdir+0x28b/0xf50 [ 1583.127318] ? cgroup_destroy_locked+0x710/0x710 [ 1583.127921] kernfs_iop_mkdir+0x14d/0x1e0 [ 1583.128466] vfs_mkdir+0x493/0x750 [ 1583.128920] do_mkdirat+0x150/0x2b0 [ 1583.129375] ? user_path_create+0xf0/0xf0 [ 1583.129892] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1583.134581] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1583.135236] do_syscall_64+0x33/0x40 [ 1583.135710] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1583.136357] RIP: 0033:0x7f510ba9db19 [ 1583.136834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1583.139163] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1583.140123] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1583.141020] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1583.141920] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1583.142824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1583.143709] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1583.147340] nfs4: Unknown parameter ':' [ 1583.166030] FAULT_INJECTION: forcing a failure. [ 1583.166030] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.168120] CPU: 1 PID: 9498 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1583.168165] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1583.168170] Call Trace: [ 1583.168188] dump_stack+0x107/0x167 [ 1583.168204] should_fail.cold+0x5/0xa [ 1583.168220] ? ext4_find_extent+0xa77/0xd70 [ 1583.168238] should_failslab+0x5/0x20 [ 1583.168252] __kmalloc+0x72/0x390 [ 1583.168263] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1583.168281] ext4_find_extent+0xa77/0xd70 [ 1583.168307] ext4_swap_extents+0x361/0x14c0 [ 1583.168322] ? mext_check_coverage.constprop.0+0x2a7/0x3e0 [ 1583.168335] ? kfree+0xd7/0x340 [ 1583.168358] ? ext4_get_es_cache+0x600/0x600 [ 1583.168378] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1583.168401] ext4_move_extents+0x2559/0x3050 [ 1583.168446] ? lock_acquire+0x197/0x470 [ 1583.168468] ? lock_acquire+0x197/0x470 [ 1583.168485] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1583.168500] ? lock_release+0x680/0x680 [ 1583.168539] __ext4_ioctl+0x302e/0x4190 [ 1583.168563] ? ext4_reset_inode_seed+0x450/0x450 [ 1583.168580] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1583.168596] ? find_held_lock+0x2c/0x110 [ 1583.168626] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1583.168640] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1583.168656] ? do_vfs_ioctl+0x283/0x10d0 [ 1583.168670] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1583.168684] ? generic_block_fiemap+0x60/0x60 [ 1583.168697] ? lock_downgrade+0x6d0/0x6d0 [ 1583.168718] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1583.168737] ? wait_for_completion_io+0x270/0x270 [ 1583.168760] ? selinux_file_ioctl+0xb6/0x270 [ 1583.168777] ? __ext4_ioctl+0x4190/0x4190 [ 1583.168794] __x64_sys_ioctl+0x19a/0x210 [ 1583.168810] do_syscall_64+0x33/0x40 [ 1583.168823] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1583.168833] RIP: 0033:0x7fb08f3deb19 [ 1583.168846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1583.168854] RSP: 002b:00007fb08c933188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1583.168869] RAX: ffffffffffffffda RBX: 00007fb08f4f2020 RCX: 00007fb08f3deb19 [ 1583.168877] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1583.168885] RBP: 00007fb08c9331d0 R08: 0000000000000000 R09: 0000000000000000 [ 1583.168893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1583.168901] R13: 00007ffe741e591f R14: 00007fb08c933300 R15: 0000000000022000 [ 1583.285581] nfs4: Unknown parameter ':' 01:50:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x3, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:50:35 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x80087601, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:50:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:50:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 21) 01:50:35 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:50:35 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:50:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 10) 01:50:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x3}, 0x11010, 0x84b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x5) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, r0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x2, r0) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) [ 1597.453447] FAULT_INJECTION: forcing a failure. [ 1597.453447] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.459895] CPU: 1 PID: 9527 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1597.460724] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1597.461725] Call Trace: [ 1597.462052] dump_stack+0x107/0x167 [ 1597.462500] should_fail.cold+0x5/0xa [ 1597.462986] ? percpu_ref_init+0xd8/0x3d0 [ 1597.463493] should_failslab+0x5/0x20 [ 1597.463958] kmem_cache_alloc_trace+0x55/0x320 [ 1597.464519] ? cset_cgroup_from_root+0x220/0x220 [ 1597.465093] percpu_ref_init+0xd8/0x3d0 [ 1597.465581] cgroup_mkdir+0x28b/0xf50 [ 1597.466053] ? cgroup_destroy_locked+0x710/0x710 [ 1597.466634] kernfs_iop_mkdir+0x14d/0x1e0 [ 1597.467161] vfs_mkdir+0x493/0x750 [ 1597.467599] do_mkdirat+0x150/0x2b0 [ 1597.468045] ? user_path_create+0xf0/0xf0 [ 1597.468555] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1597.469197] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1597.469823] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1597.469836] EXT4-fs (loop1): group descriptors corrupted! [ 1597.470960] do_syscall_64+0x33/0x40 [ 1597.471019] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1597.471035] RIP: 0033:0x7f510ba9db19 [ 1597.473245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1597.475516] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1597.476447] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1597.477316] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1597.478184] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1597.479079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1597.479948] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1597.504276] FAULT_INJECTION: forcing a failure. [ 1597.504276] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.505672] CPU: 1 PID: 9518 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1597.506500] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1597.507512] Call Trace: [ 1597.507837] dump_stack+0x107/0x167 [ 1597.508283] should_fail.cold+0x5/0xa [ 1597.508751] ? create_object.isra.0+0x3a/0xa20 [ 1597.509312] should_failslab+0x5/0x20 [ 1597.509778] kmem_cache_alloc+0x5b/0x310 [ 1597.510275] ? mark_held_locks+0x9e/0xe0 [ 1597.514791] create_object.isra.0+0x3a/0xa20 [ 1597.515341] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1597.515965] __kmalloc+0x16e/0x390 [ 1597.516408] ext4_find_extent+0xa77/0xd70 [ 1597.516924] ext4_swap_extents+0x361/0x14c0 [ 1597.517450] ? mext_check_coverage.constprop.0+0x2a7/0x3e0 [ 1597.518126] ? kfree+0xd7/0x340 [ 1597.518536] ? ext4_get_es_cache+0x600/0x600 [ 1597.519089] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1597.519714] ext4_move_extents+0x2559/0x3050 [ 1597.520276] ? lock_acquire+0x197/0x470 [ 1597.520767] ? lock_acquire+0x197/0x470 [ 1597.521252] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1597.521893] ? lock_release+0x680/0x680 [ 1597.522396] __ext4_ioctl+0x302e/0x4190 [ 1597.522905] ? ext4_reset_inode_seed+0x450/0x450 [ 1597.523486] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1597.524127] ? find_held_lock+0x2c/0x110 [ 1597.524636] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1597.525338] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1597.525972] ? do_vfs_ioctl+0x283/0x10d0 [ 1597.526467] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1597.527120] ? generic_block_fiemap+0x60/0x60 [ 1597.527666] ? lock_downgrade+0x6d0/0x6d0 [ 1597.528173] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1597.528768] ? wait_for_completion_io+0x270/0x270 [ 1597.529367] ? selinux_file_ioctl+0xb6/0x270 [ 1597.529906] ? __ext4_ioctl+0x4190/0x4190 [ 1597.530415] __x64_sys_ioctl+0x19a/0x210 [ 1597.530928] do_syscall_64+0x33/0x40 [ 1597.531384] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1597.532008] RIP: 0033:0x7fb08f3deb19 [ 1597.532467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1597.534706] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1597.539658] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1597.540525] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1597.541391] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1597.542256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1597.543136] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:50:36 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:50:36 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x802c542a, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:50:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:50:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:50:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 22) 01:50:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x4, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) 01:50:36 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1597.649578] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1597.650777] EXT4-fs (loop1): group descriptors corrupted! 01:50:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 11) [ 1597.672303] FAULT_INJECTION: forcing a failure. [ 1597.672303] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.673845] CPU: 0 PID: 9550 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1597.674673] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1597.675725] Call Trace: [ 1597.676066] dump_stack+0x107/0x167 [ 1597.676526] should_fail.cold+0x5/0xa [ 1597.677011] ? create_object.isra.0+0x3a/0xa20 [ 1597.677590] should_failslab+0x5/0x20 [ 1597.678085] kmem_cache_alloc+0x5b/0x310 [ 1597.678609] ? mark_held_locks+0x9e/0xe0 [ 1597.679157] create_object.isra.0+0x3a/0xa20 [ 1597.679720] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1597.680371] __kmalloc+0x16e/0x390 [ 1597.680836] ext4_find_extent+0xa77/0xd70 [ 1597.681381] ext4_swap_extents+0x361/0x14c0 [ 1597.681935] ? mext_check_coverage.constprop.0+0x2a7/0x3e0 [ 1597.682643] ? kfree+0xd7/0x340 [ 1597.683101] ? ext4_get_es_cache+0x600/0x600 [ 1597.683665] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1597.684305] ext4_move_extents+0x2559/0x3050 [ 1597.684894] ? lock_acquire+0x197/0x470 [ 1597.685406] ? lock_acquire+0x197/0x470 [ 1597.685907] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1597.686567] ? lock_release+0x680/0x680 [ 1597.687117] __ext4_ioctl+0x302e/0x4190 [ 1597.687633] ? ext4_reset_inode_seed+0x450/0x450 [ 1597.688228] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1597.688893] ? find_held_lock+0x2c/0x110 [ 1597.689421] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1597.690139] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1597.690796] ? do_vfs_ioctl+0x283/0x10d0 [ 1597.691324] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1597.691989] ? generic_block_fiemap+0x60/0x60 [ 1597.692555] ? lock_downgrade+0x6d0/0x6d0 [ 1597.693081] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1597.693698] ? wait_for_completion_io+0x270/0x270 [ 1597.694317] ? selinux_file_ioctl+0xb6/0x270 [ 1597.694903] ? __ext4_ioctl+0x4190/0x4190 [ 1597.695437] __x64_sys_ioctl+0x19a/0x210 [ 1597.695956] do_syscall_64+0x33/0x40 [ 1597.696430] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1597.697072] RIP: 0033:0x7fb08f3deb19 [ 1597.697544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1597.699846] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1597.700801] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1597.701692] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1597.702583] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1597.703496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1597.704392] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:50:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:50:36 executing program 2: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="00009500000000aecbf5ffdb"]) ioctl$TUNSETOWNER(r0, 0x400454cc, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rfcomm\x00') openat(r1, &(0x7f0000000100)='./file1\x00', 0x101000, 0x80) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f00000000c0)='vxfs\x00', 0x1240800, 0x0) signalfd4(r1, &(0x7f0000000140)={[0x6]}, 0x8, 0x80000) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'caif0\x00', &(0x7f0000000180)=@ethtool_gfeatures}) mknod$loop(&(0x7f0000000000)='./file0/file1\x00', 0x8000, 0x0) [ 1597.731388] FAULT_INJECTION: forcing a failure. [ 1597.731388] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.743838] CPU: 1 PID: 9558 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1597.744665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1597.745677] Call Trace: [ 1597.746005] dump_stack+0x107/0x167 [ 1597.746450] should_fail.cold+0x5/0xa [ 1597.746942] ? create_object.isra.0+0x3a/0xa20 [ 1597.747502] should_failslab+0x5/0x20 [ 1597.747968] kmem_cache_alloc+0x5b/0x310 [ 1597.748466] create_object.isra.0+0x3a/0xa20 [ 1597.749000] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1597.749620] kmem_cache_alloc_trace+0x151/0x320 [ 1597.750194] ? cset_cgroup_from_root+0x220/0x220 [ 1597.750780] percpu_ref_init+0xd8/0x3d0 [ 1597.751284] cgroup_mkdir+0x28b/0xf50 [ 1597.751754] ? cgroup_destroy_locked+0x710/0x710 [ 1597.752335] kernfs_iop_mkdir+0x14d/0x1e0 [ 1597.752845] vfs_mkdir+0x493/0x750 [ 1597.753284] do_mkdirat+0x150/0x2b0 [ 1597.753732] ? user_path_create+0xf0/0xf0 [ 1597.754252] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1597.754910] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1597.755544] do_syscall_64+0x33/0x40 [ 1597.756001] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1597.756628] RIP: 0033:0x7f510ba9db19 [ 1597.757089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1597.759363] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1597.760297] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1597.761171] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1597.762048] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1597.762942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1597.763816] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:50:36 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0xc0045878, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:50:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:50:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x14, &(0x7f0000000100)=[{0x64}, {0x6}]}, 0x10) [ 1597.821510] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1597.822743] EXT4-fs (loop1): group descriptors corrupted! 01:50:36 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:50:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:50:36 executing program 2: timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000340)='\xad', 0x6) fallocate(r0, 0x40, 0x0, 0x8) r1 = memfd_create(&(0x7f0000000340)='\xad', 0x6) fallocate(r1, 0x40, 0x0, 0x0) r2 = inotify_init() r3 = syz_open_dev$mouse(&(0x7f0000000240), 0x0, 0x280000) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x8120}, {0xffffffffffffffff, 0x1104}, {0xffffffffffffffff, 0x4000}, {r0, 0x5}, {r1, 0x1000}, {r2, 0x2514}, {r3}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x29}], 0x9, 0xffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1010, 0x2, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="fc000000130001000000000000000000ffffffff00000000eaffffffffffffffff0200000000000000000000000000010000720ed9a000000a0000002b000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB="fc000000130001000100000000000000ffffff01010000000000000000000000ff020000000000000000b32ed187748c939567000000", @ANYBLOB="4708e824f7b6dbba69ddd123dc7ba941fd61a668b44573a8ca7228cc4f0ba122947b04139d9b0831d5c860fe3341af073501c4e7b4c1533cb13de7425ea5169d6691b474fcecbf83af75686cec606ce5c26337ebf13a684219e524ee36bb448059ed4dc0e160b44222ab8f47e39a231edcc9e92e88abf23a5c46d216213ab67f50696ddb43169a822e664a94d0739c644447f144e251defeb9", @ANYRES32=0x0, @ANYBLOB="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"], 0xfc}}, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0), 0x4, 0x8000) poll(&(0x7f00000002c0), 0x0, 0x9) socket$netlink(0x10, 0x3, 0x0) getpgrp(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, &(0x7f0000000040)=0x9, 0x4) 01:50:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:50:36 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0xc0045878, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:50:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 23) [ 1597.929970] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.2'. 01:50:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x2}, {0x6}]}, 0x10) 01:50:36 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0xc0189436, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:50:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(0x0, 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 1597.974819] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1597.976038] EXT4-fs (loop1): group descriptors corrupted! [ 1597.985890] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1597.996560] FAULT_INJECTION: forcing a failure. [ 1597.996560] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.998012] CPU: 1 PID: 9587 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1597.998853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1597.999865] Call Trace: [ 1598.000197] dump_stack+0x107/0x167 [ 1598.000646] should_fail.cold+0x5/0xa [ 1598.001120] ? create_object.isra.0+0x3a/0xa20 [ 1598.001686] should_failslab+0x5/0x20 [ 1598.002156] kmem_cache_alloc+0x5b/0x310 [ 1598.002659] create_object.isra.0+0x3a/0xa20 [ 1598.003227] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1598.003850] __kmalloc+0x16e/0x390 [ 1598.004290] ext4_find_extent+0xa77/0xd70 [ 1598.004795] ? kfree+0xd7/0x340 [ 1598.005205] ext4_swap_extents+0x321/0x14c0 [ 1598.005732] ? ext4_ind_migrate+0x4e0/0x830 [ 1598.006268] ? ext4_get_es_cache+0x600/0x600 [ 1598.006822] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1598.007462] ext4_move_extents+0x2559/0x3050 [ 1598.008021] ? lock_acquire+0x197/0x470 [ 1598.008514] ? lock_acquire+0x197/0x470 [ 1598.009003] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1598.009650] ? lock_release+0x680/0x680 [ 1598.010157] __ext4_ioctl+0x302e/0x4190 [ 1598.010650] ? ext4_reset_inode_seed+0x450/0x450 [ 1598.011257] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1598.011898] ? find_held_lock+0x2c/0x110 [ 1598.012407] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1598.013105] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1598.013736] ? do_vfs_ioctl+0x283/0x10d0 [ 1598.014231] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1598.014878] ? generic_block_fiemap+0x60/0x60 [ 1598.015429] ? lock_downgrade+0x6d0/0x6d0 [ 1598.015937] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1598.016531] ? wait_for_completion_io+0x270/0x270 [ 1598.017129] ? selinux_file_ioctl+0xb6/0x270 [ 1598.017665] ? __ext4_ioctl+0x4190/0x4190 [ 1598.018174] __x64_sys_ioctl+0x19a/0x210 [ 1598.018672] do_syscall_64+0x33/0x40 [ 1598.019156] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1598.019784] RIP: 0033:0x7fb08f3deb19 [ 1598.020238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1598.022474] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1598.023428] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1598.024298] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1598.025166] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1598.026032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1598.026909] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:50:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 12) 01:50:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x23, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 01:50:50 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r6, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r4, r5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:50:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x3}, {0x6}]}, 0x10) 01:50:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:50:50 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0xc020660b, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:50:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 24) 01:50:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(0x0, 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 1611.777775] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1611.779047] EXT4-fs (loop1): group descriptors corrupted! [ 1611.806353] FAULT_INJECTION: forcing a failure. [ 1611.806353] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.810018] CPU: 1 PID: 9614 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1611.812257] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1611.814879] Call Trace: [ 1611.815618] dump_stack+0x107/0x167 [ 1611.816190] should_fail.cold+0x5/0xa [ 1611.816790] ? create_object.isra.0+0x3a/0xa20 [ 1611.817506] should_failslab+0x5/0x20 [ 1611.818113] kmem_cache_alloc+0x5b/0x310 [ 1611.818753] create_object.isra.0+0x3a/0xa20 [ 1611.819448] kmemleak_alloc_percpu+0xa0/0x100 [ 1611.820047] pcpu_alloc+0x4e2/0x1240 [ 1611.820569] cgroup_rstat_init+0x14f/0x1f0 [ 1611.821163] cgroup_mkdir+0x709/0xf50 [ 1611.821683] ? cgroup_destroy_locked+0x710/0x710 [ 1611.822309] kernfs_iop_mkdir+0x14d/0x1e0 [ 1611.822872] vfs_mkdir+0x493/0x750 [ 1611.823361] do_mkdirat+0x150/0x2b0 [ 1611.823953] ? user_path_create+0xf0/0xf0 [ 1611.824510] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1611.825825] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.827170] do_syscall_64+0x33/0x40 [ 1611.828163] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.829459] RIP: 0033:0x7f510ba9db19 [ 1611.830416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1611.835739] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1611.836991] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1611.838095] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1611.839201] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1611.840363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1611.841475] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1611.849559] FAULT_INJECTION: forcing a failure. [ 1611.849559] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.853144] CPU: 0 PID: 9625 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1611.855272] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1611.857495] Call Trace: [ 1611.858213] dump_stack+0x107/0x167 [ 1611.859164] should_fail.cold+0x5/0xa [ 1611.860337] ? ext4_find_extent+0xa77/0xd70 [ 1611.861726] should_failslab+0x5/0x20 [ 1611.862772] __kmalloc+0x72/0x390 [ 1611.863814] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1611.865168] ext4_find_extent+0xa77/0xd70 [ 1611.866299] ext4_swap_extents+0x361/0x14c0 [ 1611.867514] ? ext4_ind_migrate+0x4e0/0x830 [ 1611.868685] ? ext4_get_es_cache+0x600/0x600 [ 1611.869865] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1611.871266] ext4_move_extents+0x2559/0x3050 [ 1611.872703] ? lock_acquire+0x197/0x470 [ 1611.873755] ? lock_acquire+0x197/0x470 [ 1611.874803] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1611.875773] ? lock_release+0x680/0x680 [ 1611.876326] __ext4_ioctl+0x302e/0x4190 [ 1611.876876] ? ext4_reset_inode_seed+0x450/0x450 [ 1611.877498] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1611.878199] ? find_held_lock+0x2c/0x110 [ 1611.878750] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1611.879777] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1611.881147] ? do_vfs_ioctl+0x283/0x10d0 [ 1611.882228] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1611.883721] ? generic_block_fiemap+0x60/0x60 [ 1611.884951] ? lock_downgrade+0x6d0/0x6d0 [ 1611.886090] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1611.887443] ? wait_for_completion_io+0x270/0x270 [ 1611.888744] ? selinux_file_ioctl+0xb6/0x270 [ 1611.889920] ? __ext4_ioctl+0x4190/0x4190 [ 1611.891062] __x64_sys_ioctl+0x19a/0x210 [ 1611.892360] do_syscall_64+0x33/0x40 [ 1611.893378] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.894860] RIP: 0033:0x7fb08f3deb19 [ 1611.896014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1611.900182] RSP: 002b:00007fb08c933188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1611.901194] RAX: ffffffffffffffda RBX: 00007fb08f4f2020 RCX: 00007fb08f3deb19 [ 1611.902114] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1611.903023] RBP: 00007fb08c9331d0 R08: 0000000000000000 R09: 0000000000000000 [ 1611.904873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1611.906783] R13: 00007ffe741e591f R14: 00007fb08c933300 R15: 0000000000022000 01:51:03 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x5c, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x20) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7}, 0x7) fallocate(r1, 0x20, 0x0, 0x8000) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0000145d90def8dd8fd8db0000000000002e2f66696c65308081be6313c61c1861bf57ef7259c72e9ec3d403c5242e102931163204589635cf63ceea82956494225089059aceefe662520dd5d143efe26be9cf6e5b16988b216ffa4bdff36637f3b573c273d08d76609fdd2996ce6b152c0de117e8ac3fc2445227a5020bcdaa9d833c3171b8490f7f0da00d2cd880248aba11e404342bcc92d89e16256c30fe77ba2f9c014ce00db7774580d428606b41d76931b48f0c4746a1cab83076c85ad1d78fa835b18872bab73fb0e932caf011ac5c38d28ffcb8b3"]) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000100)={'netdevsim0\x00', 0xca4}) pipe(&(0x7f0000000140)) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x39827000) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000001800210c76f1575f36d3f5c7390000000000000000020000000800fb00000000e907001e00bce6b5fbc89070677c597d6d1ddaaa711904950f4daf1c086db78b1342b7fed2119999f6568e6ef65e2e305c83dd2b1fbe22d1373cc794d0f396dbc6a737fc7d8748656eb77588eec67f628eb0593115b2bd825a50ccb4e4973c840514d2199ada6c106fd26c47730c1d5376101f2900a675ce93eda4", @ANYRES32=r4, @ANYBLOB], 0x24}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 01:51:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 13) 01:51:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(0x0, 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:51:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:51:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x4}, {0x6}]}, 0x10) 01:51:03 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x25, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:51:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 25) 01:51:03 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r6, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r4, r5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1625.055913] FAULT_INJECTION: forcing a failure. [ 1625.055913] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.057343] CPU: 1 PID: 9632 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1625.058172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.059174] Call Trace: [ 1625.059501] dump_stack+0x107/0x167 [ 1625.059962] should_fail.cold+0x5/0xa [ 1625.060434] ? create_object.isra.0+0x3a/0xa20 [ 1625.060994] should_failslab+0x5/0x20 [ 1625.061478] kmem_cache_alloc+0x5b/0x310 [ 1625.062002] ? mark_held_locks+0x9e/0xe0 [ 1625.062521] create_object.isra.0+0x3a/0xa20 [ 1625.063087] kmemleak_alloc_percpu+0xa0/0x100 [ 1625.063667] pcpu_alloc+0x4e2/0x1240 [ 1625.064154] cgroup_rstat_init+0x14f/0x1f0 [ 1625.064681] cgroup_mkdir+0x709/0xf50 [ 1625.065162] ? cgroup_destroy_locked+0x710/0x710 [ 1625.065744] kernfs_iop_mkdir+0x14d/0x1e0 [ 1625.066272] vfs_mkdir+0x493/0x750 [ 1625.066738] do_mkdirat+0x150/0x2b0 [ 1625.067186] ? user_path_create+0xf0/0xf0 [ 1625.067698] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1625.083162] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1625.084382] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.084397] do_syscall_64+0x33/0x40 [ 1625.084410] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1625.084419] RIP: 0033:0x7f510ba9db19 [ 1625.084432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.084438] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1625.084452] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1625.084458] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1625.084465] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1625.084472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1625.084479] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1625.103501] EXT4-fs (loop1): group descriptors corrupted! [ 1625.144983] FAULT_INJECTION: forcing a failure. [ 1625.144983] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.146476] CPU: 1 PID: 9637 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1625.147380] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.148480] Call Trace: [ 1625.148834] dump_stack+0x107/0x167 [ 1625.149319] should_fail.cold+0x5/0xa [ 1625.149842] ? create_object.isra.0+0x3a/0xa20 [ 1625.150461] should_failslab+0x5/0x20 [ 1625.150970] kmem_cache_alloc+0x5b/0x310 [ 1625.151505] ? mark_held_locks+0x9e/0xe0 [ 1625.152080] create_object.isra.0+0x3a/0xa20 [ 1625.152664] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1625.153349] __kmalloc+0x16e/0x390 [ 1625.153834] ext4_find_extent+0xa77/0xd70 [ 1625.154403] ext4_swap_extents+0x361/0x14c0 [ 1625.154984] ? ext4_ind_migrate+0x4e0/0x830 [ 1625.155561] ? ext4_get_es_cache+0x600/0x600 [ 1625.156178] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1625.156852] ext4_move_extents+0x2559/0x3050 [ 1625.157490] ? lock_acquire+0x197/0x470 [ 1625.158023] ? lock_acquire+0x197/0x470 [ 1625.158576] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1625.159279] ? lock_release+0x680/0x680 [ 1625.159853] __ext4_ioctl+0x302e/0x4190 [ 1625.160413] ? ext4_reset_inode_seed+0x450/0x450 [ 1625.161045] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1625.161736] ? find_held_lock+0x2c/0x110 [ 1625.162289] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1625.163057] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1625.163740] ? do_vfs_ioctl+0x283/0x10d0 [ 1625.164314] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1625.165012] ? generic_block_fiemap+0x60/0x60 [ 1625.165607] ? lock_downgrade+0x6d0/0x6d0 [ 1625.166182] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1625.166817] ? wait_for_completion_io+0x270/0x270 [ 1625.167502] ? selinux_file_ioctl+0xb6/0x270 [ 1625.168133] ? __ext4_ioctl+0x4190/0x4190 [ 1625.168680] __x64_sys_ioctl+0x19a/0x210 [ 1625.169219] do_syscall_64+0x33/0x40 [ 1625.169703] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1625.170374] RIP: 0033:0x7fb08f3deb19 [ 1625.170867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.173251] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1625.174248] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1625.175170] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1625.176095] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1625.177022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1625.177947] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:51:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:51:03 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x11010, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x44404, 0x0, 0x2000000, 0x0, 0x1, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x800, 0x9, 0x10000, 0x5, 0x9, "01000800000000000000080000de00"}) 01:51:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x5}, {0x6}]}, 0x10) 01:51:03 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r6, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r4, r5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:51:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 14) 01:51:03 executing program 2: sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @empty}, &(0x7f0000000200)=0xc) bind(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x80000000, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x6cc4ccc75981fc79, 0x26) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="98000000", @ANYRES16=r3, @ANYBLOB="000a2cbd7000fcdbdf250b000000140001800800050002000000080009002000000014000280080004000080000008000600ff0f000008000500010000000800040011040000080006000000000008000500050000002c00028006000f0008000000080007000100000006000f00b38600000800060008000000080005000000010008000600010000000800040009000000"], 0x98}, 0x1, 0x0, 0x0, 0x20004894}, 0x240000c0) fallocate(r2, 0x0, 0x0, 0x1000002) ftruncate(0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) fstat(r4, &(0x7f0000000600)) sendfile(r4, r5, 0x0, 0x100000001) [ 1625.270986] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1625.272481] EXT4-fs (loop1): group descriptors corrupted! 01:51:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:51:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 1625.373844] FAULT_INJECTION: forcing a failure. [ 1625.373844] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.382232] CPU: 0 PID: 9666 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1625.382241] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.382246] Call Trace: [ 1625.382268] dump_stack+0x107/0x167 [ 1625.382286] should_fail.cold+0x5/0xa [ 1625.382310] should_failslab+0x5/0x20 [ 1625.382328] __kmalloc_track_caller+0x79/0x370 [ 1625.382344] ? kstrdup_const+0x53/0x80 [ 1625.382359] ? find_held_lock+0x2c/0x110 [ 1625.382379] kstrdup+0x36/0x70 [ 1625.382399] kstrdup_const+0x53/0x80 [ 1625.392968] __kernfs_new_node+0x9d/0x860 [ 1625.393525] ? mark_held_locks+0x9e/0xe0 [ 1625.394079] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1625.394726] ? cpumask_next+0x1f/0x30 [ 1625.395232] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1625.395879] ? pcpu_alloc+0x12a/0x1240 [ 1625.396401] kernfs_new_node+0x18d/0x250 [ 1625.396968] kernfs_create_dir_ns+0x49/0x160 [ 1625.397553] cgroup_mkdir+0x318/0xf50 [ 1625.398073] ? cgroup_destroy_locked+0x710/0x710 [ 1625.398700] kernfs_iop_mkdir+0x14d/0x1e0 [ 1625.399267] vfs_mkdir+0x493/0x750 [ 1625.399739] do_mkdirat+0x150/0x2b0 [ 1625.400270] ? user_path_create+0xf0/0xf0 [ 1625.400816] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1625.401539] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.402229] do_syscall_64+0x33/0x40 [ 1625.402733] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1625.403414] RIP: 0033:0x7f510ba9db19 [ 1625.403937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.406352] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1625.407356] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1625.408329] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1625.409288] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1625.410251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:51:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x6}, {0x6}]}, 0x10) [ 1625.411221] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1625.432660] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1625.433889] EXT4-fs (loop1): group descriptors corrupted! 01:51:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:51:17 executing program 7: getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)=""/10, &(0x7f0000000040)=0xa) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0xfffffffe, 0x9, 0x67, 0x3, 0xf, "992c6846a492ffbd214ef12863338b1e463675"}) 01:51:17 executing program 2: unshare(0x28020600) semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000300) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="030000000008000000000076de76c4e4f082c1048dcc22006b31f3c8f0cb3949f8e9ccfd62c5cd5a3d35294729dea673951fd9f47eef68869bd87eb9f92a2e3dbfd87e33bfa61489c7740f139df0e8ab708cb3c4ff274f3a3934ef8e4ccc48"]) unshare(0x48020200) unshare(0x0) 01:51:17 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x4, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:51:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 15) 01:51:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:51:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x7}, {0x6}]}, 0x10) 01:51:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 26) [ 1638.666630] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1638.667797] EXT4-fs (loop1): group descriptors corrupted! [ 1638.678221] FAULT_INJECTION: forcing a failure. [ 1638.678221] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.679766] CPU: 1 PID: 9696 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1638.680657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1638.681719] Call Trace: [ 1638.682052] dump_stack+0x107/0x167 [ 1638.682572] should_fail.cold+0x5/0xa [ 1638.683042] ? ext4_find_extent+0xa77/0xd70 [ 1638.683621] should_failslab+0x5/0x20 [ 1638.684143] __kmalloc+0x72/0x390 [ 1638.684582] ext4_find_extent+0xa77/0xd70 [ 1638.685136] ? kfree+0xd7/0x340 [ 1638.685548] ext4_swap_extents+0x321/0x14c0 [ 1638.686153] ? ext4_ind_migrate+0x4d3/0x830 [ 1638.686691] ? ext4_get_es_cache+0x600/0x600 [ 1638.687282] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1638.687911] ext4_move_extents+0x2559/0x3050 [ 1638.688538] ? lock_acquire+0x197/0x470 [ 1638.689032] ? lock_acquire+0x197/0x470 [ 1638.689567] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1638.690259] ? lock_release+0x680/0x680 [ 1638.690766] __ext4_ioctl+0x302e/0x4190 [ 1638.691338] ? ext4_reset_inode_seed+0x450/0x450 [ 1638.691920] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1638.692619] ? find_held_lock+0x2c/0x110 [ 1638.693185] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1638.693890] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1638.694600] ? do_vfs_ioctl+0x283/0x10d0 [ 1638.695183] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1638.695827] ? generic_block_fiemap+0x60/0x60 [ 1638.696480] ? lock_downgrade+0x6d0/0x6d0 [ 1638.696991] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1638.697790] ? wait_for_completion_io+0x270/0x270 [ 1638.698438] ? selinux_file_ioctl+0xb6/0x270 [ 1638.698985] ? __ext4_ioctl+0x4190/0x4190 [ 1638.699541] __x64_sys_ioctl+0x19a/0x210 [ 1638.700052] do_syscall_64+0x33/0x40 [ 1638.700596] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1638.701272] RIP: 0033:0x7fb08f3deb19 [ 1638.701728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1638.704103] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1638.705129] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1638.706010] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1638.706926] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1638.707840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1638.708781] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:51:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) [ 1638.725025] FAULT_INJECTION: forcing a failure. [ 1638.725025] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.726603] CPU: 1 PID: 9694 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1638.727502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1638.728585] Call Trace: [ 1638.728908] dump_stack+0x107/0x167 [ 1638.729406] should_fail.cold+0x5/0xa [ 1638.729872] ? create_object.isra.0+0x3a/0xa20 [ 1638.730476] should_failslab+0x5/0x20 [ 1638.730939] kmem_cache_alloc+0x5b/0x310 [ 1638.731510] create_object.isra.0+0x3a/0xa20 [ 1638.732053] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1638.732753] __kmalloc_track_caller+0x177/0x370 [ 1638.733373] ? kstrdup_const+0x53/0x80 [ 1638.733850] ? find_held_lock+0x2c/0x110 [ 1638.734397] kstrdup+0x36/0x70 [ 1638.734792] kstrdup_const+0x53/0x80 [ 1638.735325] __kernfs_new_node+0x9d/0x860 [ 1638.735833] ? mark_held_locks+0x9e/0xe0 [ 1638.736390] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1638.736978] ? cpumask_next+0x1f/0x30 [ 1638.737494] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1638.738117] ? pcpu_alloc+0x12a/0x1240 [ 1638.738606] kernfs_new_node+0x18d/0x250 [ 1638.739185] kernfs_create_dir_ns+0x49/0x160 [ 1638.739729] cgroup_mkdir+0x318/0xf50 [ 1638.740252] ? cgroup_destroy_locked+0x710/0x710 [ 1638.740853] kernfs_iop_mkdir+0x14d/0x1e0 [ 1638.741411] vfs_mkdir+0x493/0x750 [ 1638.741849] do_mkdirat+0x150/0x2b0 [ 1638.742345] ? user_path_create+0xf0/0xf0 [ 1638.742855] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1638.743542] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1638.744251] do_syscall_64+0x33/0x40 [ 1638.744733] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1638.745410] RIP: 0033:0x7f510ba9db19 [ 1638.745871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1638.748251] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1638.749274] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1638.750195] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1638.751111] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1638.751988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1638.752931] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:51:17 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) fcntl$notify(r1, 0x402, 0x80000004) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x66]}, 0x8, 0x80000) openat(r3, &(0x7f0000000080)='./file0\x00', 0x100, 0x1) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:51:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0xc}, {0x6}]}, 0x10) 01:51:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 1638.785227] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:51:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 27) [ 1638.989144] FAULT_INJECTION: forcing a failure. [ 1638.989144] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.990549] CPU: 0 PID: 9724 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1638.991380] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1638.992398] Call Trace: [ 1638.992735] dump_stack+0x107/0x167 [ 1638.993184] should_fail.cold+0x5/0xa [ 1638.993653] ? ext4_find_extent+0xa77/0xd70 [ 1638.994198] should_failslab+0x5/0x20 [ 1638.994667] __kmalloc+0x72/0x390 [ 1638.995098] ext4_find_extent+0xa77/0xd70 [ 1638.995605] ? kfree+0xd7/0x340 [ 1638.996019] ext4_swap_extents+0x321/0x14c0 [ 1638.996554] ? ext4_ind_migrate+0x4d3/0x830 [ 1638.997093] ? ext4_get_es_cache+0x600/0x600 [ 1638.997638] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1638.998270] ext4_move_extents+0x2559/0x3050 [ 1638.998841] ? lock_acquire+0x197/0x470 [ 1638.999336] ? lock_acquire+0x197/0x470 [ 1638.999827] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1639.000670] ? lock_release+0x680/0x680 [ 1639.001664] __ext4_ioctl+0x302e/0x4190 [ 1639.002164] ? ext4_reset_inode_seed+0x450/0x450 [ 1639.002753] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1639.003397] ? find_held_lock+0x2c/0x110 [ 1639.003907] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1639.004624] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1639.005259] ? do_vfs_ioctl+0x283/0x10d0 [ 1639.005757] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1639.006397] ? generic_block_fiemap+0x60/0x60 [ 1639.006948] ? lock_downgrade+0x6d0/0x6d0 [ 1639.007459] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1639.008054] ? wait_for_completion_io+0x270/0x270 [ 1639.008666] ? selinux_file_ioctl+0xb6/0x270 [ 1639.009210] ? __ext4_ioctl+0x4190/0x4190 [ 1639.009723] __x64_sys_ioctl+0x19a/0x210 [ 1639.010223] do_syscall_64+0x33/0x40 [ 1639.010685] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1639.011313] RIP: 0033:0x7fb08f3deb19 [ 1639.011772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.014031] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1639.014970] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1639.015843] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1639.016754] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.017633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.018522] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:51:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 28) 01:51:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) [ 1652.376471] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1652.406054] FAULT_INJECTION: forcing a failure. [ 1652.406054] name failslab, interval 1, probability 0, space 0, times 0 01:51:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x7f, 0x80, 0x6e, 0x40, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x1, 0x8}, 0x4000, 0xfffffffffffffffc, 0x3, 0x0, 0x4, 0x3, 0x7ff, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xc, r1, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000260001670000000000000000000000001800008008000000", @ANYRES32=0x0, @ANYBLOB="9f1aaa4a5e594cb76a8874bb6d206e1358b0ed028471"], 0x2c}, 0x1, 0x0, 0x0, 0xa0}, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r2, 0x4, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r4, 0xb99771294b5ad721}, 0x14}}, 0x0) readv(r3, &(0x7f0000000300)=[{&(0x7f0000000000)=""/79, 0x4f}, {&(0x7f0000000140)}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f0000000280)=""/114, 0x72}], 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000500)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) syz_io_uring_setup(0x21, &(0x7f0000000340)={0x0, 0x7b5c, 0x2, 0x3, 0x1c, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000000080)) 01:51:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x14}, {0x6}]}, 0x10) 01:51:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:51:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 16) 01:51:30 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x4, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:51:30 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x80, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1652.419678] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1652.426298] CPU: 0 PID: 9733 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1652.427129] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.428135] Call Trace: [ 1652.428464] dump_stack+0x107/0x167 [ 1652.428927] should_fail.cold+0x5/0xa [ 1652.429396] ? ext4_find_extent+0xa77/0xd70 [ 1652.429927] should_failslab+0x5/0x20 [ 1652.430393] __kmalloc+0x72/0x390 [ 1652.430817] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1652.431440] ext4_find_extent+0xa77/0xd70 [ 1652.431956] ext4_swap_extents+0x361/0x14c0 [ 1652.432488] ? ext4_ind_migrate+0x4d3/0x830 [ 1652.433046] ? ext4_get_es_cache+0x600/0x600 [ 1652.433587] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1652.434216] ext4_move_extents+0x2559/0x3050 [ 1652.434779] ? lock_acquire+0x197/0x470 [ 1652.435275] ? lock_acquire+0x197/0x470 [ 1652.435766] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1652.436412] ? lock_release+0x680/0x680 [ 1652.436944] __ext4_ioctl+0x302e/0x4190 [ 1652.437440] ? ext4_reset_inode_seed+0x450/0x450 [ 1652.438020] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1652.438660] ? find_held_lock+0x2c/0x110 [ 1652.439168] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1652.439866] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1652.440497] ? do_vfs_ioctl+0x283/0x10d0 [ 1652.441007] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1652.441645] ? generic_block_fiemap+0x60/0x60 [ 1652.442189] ? lock_downgrade+0x6d0/0x6d0 [ 1652.442698] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1652.443288] ? wait_for_completion_io+0x270/0x270 [ 1652.443881] ? selinux_file_ioctl+0xb6/0x270 [ 1652.444419] ? __ext4_ioctl+0x4190/0x4190 [ 1652.444934] __x64_sys_ioctl+0x19a/0x210 [ 1652.445431] do_syscall_64+0x33/0x40 [ 1652.445885] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.446509] RIP: 0033:0x7fb08f3deb19 [ 1652.446963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.449213] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1652.450139] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1652.451007] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1652.451874] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1652.452741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1652.453609] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:51:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 29) [ 1652.488232] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1652.503144] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:51:31 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f0000000140)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1652.516270] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1652.545106] FAULT_INJECTION: forcing a failure. [ 1652.545106] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.546783] CPU: 1 PID: 9747 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1652.547685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.548774] Call Trace: [ 1652.549146] dump_stack+0x107/0x167 [ 1652.549634] should_fail.cold+0x5/0xa [ 1652.550151] ? __kernfs_new_node+0xd4/0x860 [ 1652.550729] should_failslab+0x5/0x20 [ 1652.551237] kmem_cache_alloc+0x5b/0x310 [ 1652.551786] __kernfs_new_node+0xd4/0x860 [ 1652.552327] ? mark_held_locks+0x9e/0xe0 [ 1652.552872] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1652.553503] ? cpumask_next+0x1f/0x30 [ 1652.554002] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1652.554610] ? pcpu_alloc+0x12a/0x1240 [ 1652.555127] kernfs_new_node+0x18d/0x250 [ 1652.555670] kernfs_create_dir_ns+0x49/0x160 [ 1652.556271] cgroup_mkdir+0x318/0xf50 [ 1652.556788] ? cgroup_destroy_locked+0x710/0x710 [ 1652.557435] kernfs_iop_mkdir+0x14d/0x1e0 [ 1652.557981] vfs_mkdir+0x493/0x750 [ 1652.558448] do_mkdirat+0x150/0x2b0 [ 1652.558927] ? user_path_create+0xf0/0xf0 [ 1652.559469] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1652.560149] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.560821] do_syscall_64+0x33/0x40 [ 1652.565338] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.566000] RIP: 0033:0x7f510ba9db19 [ 1652.566484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.568938] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1652.569922] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1652.570842] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1652.571762] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1652.572703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1652.573670] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1652.596608] FAULT_INJECTION: forcing a failure. [ 1652.596608] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.598226] CPU: 1 PID: 9755 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1652.599132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.600236] Call Trace: [ 1652.600601] dump_stack+0x107/0x167 [ 1652.601108] should_fail.cold+0x5/0xa [ 1652.601619] ? create_object.isra.0+0x3a/0xa20 [ 1652.602232] should_failslab+0x5/0x20 [ 1652.602737] kmem_cache_alloc+0x5b/0x310 [ 1652.603279] ? mark_held_locks+0x9e/0xe0 [ 1652.603829] create_object.isra.0+0x3a/0xa20 [ 1652.604412] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1652.605090] __kmalloc+0x16e/0x390 [ 1652.605531] ext4_find_extent+0xa77/0xd70 [ 1652.606046] ext4_swap_extents+0x361/0x14c0 [ 1652.606570] ? ext4_ind_migrate+0x4d3/0x830 [ 1652.607105] ? ext4_get_es_cache+0x600/0x600 [ 1652.607652] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1652.608278] ext4_move_extents+0x2559/0x3050 [ 1652.608841] ? lock_acquire+0x197/0x470 [ 1652.609401] ? lock_acquire+0x197/0x470 [ 1652.609939] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1652.610638] ? lock_release+0x680/0x680 [ 1652.611195] __ext4_ioctl+0x302e/0x4190 [ 1652.611739] ? ext4_reset_inode_seed+0x450/0x450 [ 1652.612371] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1652.613084] ? find_held_lock+0x2c/0x110 [ 1652.613643] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1652.614410] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1652.615097] ? do_vfs_ioctl+0x283/0x10d0 [ 1652.615634] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1652.616331] ? generic_block_fiemap+0x60/0x60 [ 1652.616942] ? lock_downgrade+0x6d0/0x6d0 [ 1652.617501] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1652.618144] ? wait_for_completion_io+0x270/0x270 [ 1652.618793] ? selinux_file_ioctl+0xb6/0x270 [ 1652.619383] ? __ext4_ioctl+0x4190/0x4190 [ 1652.619933] __x64_sys_ioctl+0x19a/0x210 [ 1652.620473] do_syscall_64+0x33/0x40 [ 1652.620980] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.621652] RIP: 0033:0x7fb08f3deb19 [ 1652.622147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.624570] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1652.625594] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1652.626541] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1652.627486] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1652.628432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1652.629359] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:51:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x15}, {0x6}]}, 0x10) 01:51:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:51:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:51:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x16}, {0x6}]}, 0x10) 01:51:31 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x4, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1652.739847] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:51:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:51:31 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, 0x0]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:51:31 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xff, 0x0, 0xbd, 0x1, 0x0, 0xfffffffffffffffa, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0x112c, 0x400, 0x67cf, 0x9, 0xfffffffffffffff7, 0x3, 0x960, 0x0, 0x22e, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0xa) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1652.871317] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:51:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:51:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:51:44 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000040)) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x9, 0x8, 0xb96, 0x2, 0x0, "10f45584991d277cc782bb9630661a15d51d69", 0xd4b, 0x408}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x9ba, 0x2000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xac3ae5ed, 0x1, @perf_config_ext={0x2}, 0x40800, 0x1f, 0x6, 0x1, 0x1, 0x3, 0x6, 0x0, 0x2, 0x0, 0x1}, 0xffffffffffffffff, 0x10, r1, 0x9) pidfd_open(r2, 0x0) r3 = signalfd4(r0, &(0x7f0000000140)={[0x54]}, 0x8, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x3f, 0x0, 0x4, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffc, 0x2, @perf_bp={&(0x7f0000000080)}, 0x10004, 0x9, 0x80000001, 0x7, 0x49fc, 0x40, 0x1, 0x0, 0x3, 0x0, 0x1f}, r2, 0xe, r3, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 01:51:44 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fcdbdf251d00238008001a0002000000080017000300000006001b0080000000060400000008001a000300000005000e0003000000082003005988cd64f7de11468d4eb9d9721710fdd67b00000000000000", @ANYRES32=r3, @ANYBLOB="0c009900060000001b0000000c009900b7080000790000000c002380050005000a0000001c002380060010000300000008001500fb0000000500110000000000"], 0xa4}, 0x1, 0x0, 0x0, 0x10000015}, 0x8000) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x1e0, r0, 0x300, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x65}, @val={0x8, 0x3, r3}, @val={0xc, 0x99, {0xffff, 0x46}}}}, [@NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x5fbb}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x5}, @NL80211_ATTR_VENDOR_DATA={0x96, 0xc5, "688f6460541eeea64f5c4851bed3c04c38f66e43b09195817e233f3e1926eb82f79ed62e0b3063cdccd17d1783866ec0c06c94e9b7d6302e932af631f3fab96d964ae416062be1f7fdd17bf220f29a838251ec3e34b7698176235d2d992c504775a69c8a9c2e35cead86a24ccccb760970c5bdc858d7a7228ce1411b8f8becf37830c82d40c351d66290c2973eb02730410f"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}, @NL80211_ATTR_VENDOR_DATA={0xaa, 0xc5, "d73a8f6e1c53c4f2db16ea85d32b3277f2aabdcaba35f7452571de87e371550034e1eccf1c4cb067a006aa591602858a54bf3f6940674bd8ceb2a2fe03eef5237dbe72f9fff1c36493feab62f76275ddfc0e3d850ba27b554b650bd54dd3e6e21a72066343a67abc075b2454e3cfb489a73d37438e9d5cf8c741e9e32d5277475adf4f30a6a97549b4f3ba8c8d29dd771562721704adbaf56cddf94b94061da91e50d79e084c"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x3f}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x1}, @NL80211_ATTR_VENDOR_DATA={0x3b, 0xc5, "9929609fc4694a80d20ec5f26795e873e681f05cd8b9a3dc7fb0486ca10d267b88576fdf4d5a97ee23b50c5266bc1361d6175a9a134395"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x8}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x800}, 0x4004) r4 = dup(r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r4) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @remote, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {0x12}}}}}, 0x0) 01:51:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 30) 01:51:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 17) 01:51:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x1c}, {0x6}]}, 0x10) 01:51:44 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, 0x0]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1666.472320] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1666.488073] FAULT_INJECTION: forcing a failure. [ 1666.488073] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.489540] CPU: 0 PID: 9799 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1666.490413] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1666.491483] Call Trace: [ 1666.491839] dump_stack+0x107/0x167 [ 1666.492321] should_fail.cold+0x5/0xa [ 1666.492827] ? jbd2__journal_start+0x190/0x7e0 [ 1666.493440] should_failslab+0x5/0x20 [ 1666.493950] kmem_cache_alloc+0x5b/0x310 [ 1666.494491] jbd2__journal_start+0x190/0x7e0 [ 1666.495082] __ext4_journal_start_sb+0x214/0x390 [ 1666.495710] ext4_move_extents+0x10bb/0x3050 [ 1666.496322] ? lock_acquire+0x197/0x470 [ 1666.496847] ? lock_acquire+0x197/0x470 [ 1666.497372] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1666.498070] ? lock_release+0x680/0x680 [ 1666.498596] __ext4_ioctl+0x302e/0x4190 [ 1666.499106] ? ext4_reset_inode_seed+0x450/0x450 [ 1666.499705] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1666.500361] ? find_held_lock+0x2c/0x110 [ 1666.500894] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1666.501653] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1666.502325] ? do_vfs_ioctl+0x283/0x10d0 [ 1666.502842] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1666.503521] ? generic_block_fiemap+0x60/0x60 [ 1666.504105] ? lock_downgrade+0x6d0/0x6d0 [ 1666.504645] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1666.505275] ? wait_for_completion_io+0x270/0x270 [ 1666.509936] ? selinux_file_ioctl+0xb6/0x270 [ 1666.510516] ? __ext4_ioctl+0x4190/0x4190 [ 1666.511058] __x64_sys_ioctl+0x19a/0x210 [ 1666.511593] do_syscall_64+0x33/0x40 [ 1666.512077] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1666.512745] RIP: 0033:0x7fb08f3deb19 [ 1666.513235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.515327] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1666.516179] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1666.517071] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1666.517924] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.518795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1666.519664] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:51:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:51:45 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x0, 0x9, 0x6, 0x2, 0x1}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd69d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) syz_open_dev$tty1(0xc, 0x4, 0x4) [ 1666.570418] FAULT_INJECTION: forcing a failure. [ 1666.570418] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.572056] CPU: 0 PID: 9793 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1666.572941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1666.574025] Call Trace: [ 1666.574372] dump_stack+0x107/0x167 [ 1666.574844] should_fail.cold+0x5/0xa [ 1666.575348] ? create_object.isra.0+0x3a/0xa20 [ 1666.575946] should_failslab+0x5/0x20 [ 1666.576444] kmem_cache_alloc+0x5b/0x310 [ 1666.576979] create_object.isra.0+0x3a/0xa20 [ 1666.577553] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1666.578173] kmem_cache_alloc+0x159/0x310 [ 1666.578685] __kernfs_new_node+0xd4/0x860 [ 1666.579193] ? mark_held_locks+0x9e/0xe0 [ 1666.579691] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1666.580274] ? cpumask_next+0x1f/0x30 [ 1666.580738] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1666.581307] ? pcpu_alloc+0x12a/0x1240 [ 1666.581833] kernfs_new_node+0x18d/0x250 [ 1666.582352] kernfs_create_dir_ns+0x49/0x160 [ 1666.582895] cgroup_mkdir+0x318/0xf50 [ 1666.583365] ? cgroup_destroy_locked+0x710/0x710 [ 1666.583938] kernfs_iop_mkdir+0x14d/0x1e0 [ 1666.584442] vfs_mkdir+0x493/0x750 [ 1666.584875] do_mkdirat+0x150/0x2b0 [ 1666.585318] ? user_path_create+0xf0/0xf0 [ 1666.585860] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1666.586495] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1666.587125] do_syscall_64+0x33/0x40 [ 1666.587584] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1666.588204] RIP: 0033:0x7f510ba9db19 [ 1666.588658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.591000] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1666.591931] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1666.592802] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1666.593710] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.594626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1666.595548] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:51:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:51:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 31) 01:51:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 18) 01:51:45 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, 0x0]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1666.639393] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 01:51:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:51:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x1d}, {0x6}]}, 0x10) [ 1666.709254] FAULT_INJECTION: forcing a failure. [ 1666.709254] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.710692] CPU: 1 PID: 9825 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1666.717816] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1666.718817] Call Trace: [ 1666.719145] dump_stack+0x107/0x167 [ 1666.719589] should_fail.cold+0x5/0xa [ 1666.720057] ? selinux_kernfs_init_security+0x137/0x4c0 [ 1666.720703] should_failslab+0x5/0x20 [ 1666.721166] __kmalloc+0x72/0x390 [ 1666.721606] selinux_kernfs_init_security+0x137/0x4c0 [ 1666.722234] ? selinux_file_mprotect+0x610/0x610 [ 1666.722815] ? find_held_lock+0x2c/0x110 [ 1666.723315] ? __kernfs_new_node+0x2ad/0x860 [ 1666.723851] ? lock_downgrade+0x6d0/0x6d0 [ 1666.724355] ? rwlock_bug.part.0+0x90/0x90 [ 1666.724878] security_kernfs_init_security+0x4e/0xb0 [ 1666.725508] __kernfs_new_node+0x531/0x860 [ 1666.726028] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1666.726609] ? cpumask_next+0x1f/0x30 [ 1666.727075] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1666.727644] ? pcpu_alloc+0x12a/0x1240 [ 1666.728121] kernfs_new_node+0x18d/0x250 [ 1666.728619] kernfs_create_dir_ns+0x49/0x160 [ 1666.729158] cgroup_mkdir+0x318/0xf50 [ 1666.729638] ? cgroup_destroy_locked+0x710/0x710 [ 1666.730213] kernfs_iop_mkdir+0x14d/0x1e0 [ 1666.730721] vfs_mkdir+0x493/0x750 [ 1666.731156] do_mkdirat+0x150/0x2b0 [ 1666.731600] ? user_path_create+0xf0/0xf0 [ 1666.732107] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1666.732744] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1666.733374] do_syscall_64+0x33/0x40 [ 1666.733840] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1666.734463] RIP: 0033:0x7f510ba9db19 [ 1666.734917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.737146] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1666.738085] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1666.738954] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1666.739819] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.740685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1666.741587] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1666.783515] FAULT_INJECTION: forcing a failure. [ 1666.783515] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.784919] CPU: 1 PID: 9827 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1666.785771] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1666.786783] Call Trace: [ 1666.787112] dump_stack+0x107/0x167 [ 1666.787559] should_fail.cold+0x5/0xa [ 1666.788034] ? create_object.isra.0+0x3a/0xa20 [ 1666.788597] should_failslab+0x5/0x20 [ 1666.789064] kmem_cache_alloc+0x5b/0x310 [ 1666.793594] create_object.isra.0+0x3a/0xa20 [ 1666.794131] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1666.794750] kmem_cache_alloc+0x159/0x310 [ 1666.795261] jbd2__journal_start+0x190/0x7e0 [ 1666.795804] __ext4_journal_start_sb+0x214/0x390 [ 1666.796386] ext4_move_extents+0x10bb/0x3050 [ 1666.796942] ? lock_acquire+0x197/0x470 [ 1666.797455] ? lock_acquire+0x197/0x470 [ 1666.797947] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1666.798589] ? lock_release+0x680/0x680 [ 1666.799094] __ext4_ioctl+0x302e/0x4190 [ 1666.799590] ? ext4_reset_inode_seed+0x450/0x450 [ 1666.800172] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1666.800814] ? find_held_lock+0x2c/0x110 [ 1666.801324] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1666.802051] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1666.802682] ? do_vfs_ioctl+0x283/0x10d0 [ 1666.803175] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1666.803816] ? generic_block_fiemap+0x60/0x60 [ 1666.804365] ? lock_downgrade+0x6d0/0x6d0 [ 1666.804875] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1666.805477] ? wait_for_completion_io+0x270/0x270 [ 1666.806071] ? selinux_file_ioctl+0xb6/0x270 [ 1666.806612] ? __ext4_ioctl+0x4190/0x4190 [ 1666.807121] __x64_sys_ioctl+0x19a/0x210 [ 1666.807619] do_syscall_64+0x33/0x40 [ 1666.808073] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1666.808696] RIP: 0033:0x7fb08f3deb19 [ 1666.809149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.815405] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1666.816331] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1666.817191] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1666.818068] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.818932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1666.819798] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:51:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 19) 01:51:58 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x40800, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000440)={0x1, 0x0, 0x0, "db"}) epoll_create(0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:51:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 32) 01:51:58 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:51:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:51:58 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) 01:51:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:51:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x21}, {0x6}]}, 0x10) [ 1679.874176] program syz-executor.7 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1679.885963] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1679.891278] EXT4-fs (loop1): group descriptors corrupted! 01:51:58 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000004) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x80000, 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="34010000170001000000000000000000fe8800000000000000000000ce4190da000000010000000000000000e000000100000000000000000000000000000000000000000000000000000000fc00"/108, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="200100000000000000000000000000027f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000800cdfe080000000000"], 0x134}}, 0x8884) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) [ 1679.906009] FAULT_INJECTION: forcing a failure. [ 1679.906009] name failslab, interval 1, probability 0, space 0, times 0 [ 1679.908063] CPU: 0 PID: 9847 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1679.908898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1679.909916] Call Trace: [ 1679.910249] dump_stack+0x107/0x167 [ 1679.910703] should_fail.cold+0x5/0xa [ 1679.911172] ? create_object.isra.0+0x3a/0xa20 [ 1679.911734] should_failslab+0x5/0x20 [ 1679.912200] kmem_cache_alloc+0x5b/0x310 [ 1679.912701] create_object.isra.0+0x3a/0xa20 [ 1679.913256] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1679.913881] kmem_cache_alloc+0x159/0x310 [ 1679.914410] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1679.915097] idr_get_free+0x4b5/0x8f0 [ 1679.915574] idr_alloc_u32+0x170/0x2d0 [ 1679.916054] ? __fprop_inc_percpu_max+0x130/0x130 [ 1679.916645] ? lock_acquire+0x197/0x470 [ 1679.917134] ? __kernfs_new_node+0xff/0x860 [ 1679.917666] idr_alloc_cyclic+0x102/0x230 [ 1679.918191] ? idr_alloc+0x130/0x130 [ 1679.918645] ? rwlock_bug.part.0+0x90/0x90 [ 1679.919175] __kernfs_new_node+0x117/0x860 [ 1679.919692] ? mark_held_locks+0x9e/0xe0 [ 1679.920197] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1679.920779] ? cpumask_next+0x1f/0x30 [ 1679.921250] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1679.921848] ? pcpu_alloc+0x12a/0x1240 [ 1679.922349] kernfs_new_node+0x18d/0x250 [ 1679.922850] kernfs_create_dir_ns+0x49/0x160 [ 1679.923413] cgroup_mkdir+0x318/0xf50 [ 1679.923884] ? cgroup_destroy_locked+0x710/0x710 [ 1679.924464] kernfs_iop_mkdir+0x14d/0x1e0 [ 1679.924974] vfs_mkdir+0x493/0x750 [ 1679.925411] do_mkdirat+0x150/0x2b0 [ 1679.925857] ? user_path_create+0xf0/0xf0 [ 1679.926399] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1679.927038] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1679.927671] do_syscall_64+0x33/0x40 [ 1679.928126] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1679.928753] RIP: 0033:0x7f510ba9db19 [ 1679.929207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1679.931453] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1679.932377] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1679.933267] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1679.934148] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1679.935014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1679.935879] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1679.947295] FAULT_INJECTION: forcing a failure. [ 1679.947295] name failslab, interval 1, probability 0, space 0, times 0 [ 1679.959311] CPU: 1 PID: 9861 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1679.960158] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 01:51:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 20) 01:51:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x24}, {0x6}]}, 0x10) [ 1679.961190] Call Trace: [ 1679.970203] dump_stack+0x107/0x167 [ 1679.970653] should_fail.cold+0x5/0xa [ 1679.971124] ? create_object.isra.0+0x3a/0xa20 [ 1679.971685] should_failslab+0x5/0x20 01:51:58 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1679.972153] kmem_cache_alloc+0x5b/0x310 [ 1679.982012] create_object.isra.0+0x3a/0xa20 [ 1679.982558] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1679.983183] kmem_cache_alloc+0x159/0x310 [ 1679.983703] jbd2__journal_start+0x190/0x7e0 [ 1679.984247] __ext4_journal_start_sb+0x214/0x390 [ 1679.984830] ext4_move_extents+0x10bb/0x3050 [ 1679.985389] ? lock_acquire+0x197/0x470 [ 1679.985884] ? lock_acquire+0x197/0x470 [ 1679.986402] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1679.987045] ? lock_release+0x680/0x680 [ 1679.987546] __ext4_ioctl+0x302e/0x4190 [ 1679.988046] ? ext4_reset_inode_seed+0x450/0x450 [ 1679.988624] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1679.989264] ? find_held_lock+0x2c/0x110 [ 1679.989769] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1679.990503] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1679.991136] ? do_vfs_ioctl+0x283/0x10d0 [ 1679.991633] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1679.992272] ? generic_block_fiemap+0x60/0x60 [ 1679.992821] ? lock_downgrade+0x6d0/0x6d0 [ 1679.993328] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1679.993927] ? wait_for_completion_io+0x270/0x270 [ 1679.994527] ? selinux_file_ioctl+0xb6/0x270 [ 1679.995068] ? __ext4_ioctl+0x4190/0x4190 [ 1679.997099] __x64_sys_ioctl+0x19a/0x210 [ 1679.997635] do_syscall_64+0x33/0x40 [ 1679.998148] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1679.998839] RIP: 0033:0x7fb08f3deb19 [ 1679.999325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1680.001808] RSP: 002b:00007fb08c933188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1680.002844] RAX: ffffffffffffffda RBX: 00007fb08f4f2020 RCX: 00007fb08f3deb19 [ 1680.003784] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1680.004701] RBP: 00007fb08c9331d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.005641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1680.006555] R13: 00007ffe741e591f R14: 00007fb08c933300 R15: 0000000000022000 01:51:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 1680.090434] FAULT_INJECTION: forcing a failure. [ 1680.090434] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.092179] CPU: 0 PID: 9871 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1680.093155] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.094351] Call Trace: [ 1680.094688] dump_stack+0x107/0x167 [ 1680.095135] should_fail.cold+0x5/0xa [ 1680.095620] should_failslab+0x5/0x20 [ 1680.096086] __kmalloc_track_caller+0x79/0x370 [ 1680.096673] ? security_context_to_sid_core+0xb4/0x890 [ 1680.097320] kmemdup_nul+0x2d/0xa0 [ 1680.097754] security_context_to_sid_core+0xb4/0x890 [ 1680.098387] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 1680.099051] ? do_raw_spin_lock+0x121/0x260 [ 1680.099598] ? rwlock_bug.part.0+0x90/0x90 [ 1680.100120] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1680.100715] ? do_raw_spin_unlock+0x4f/0x220 [ 1680.101257] ? _raw_spin_unlock+0x1a/0x30 [ 1680.101772] security_context_to_sid+0x35/0x50 [ 1680.102359] selinux_kernfs_init_security+0x19d/0x4c0 [ 1680.102993] ? selinux_file_mprotect+0x610/0x610 [ 1680.103573] ? find_held_lock+0x2c/0x110 [ 1680.104083] ? __kernfs_new_node+0x2ad/0x860 [ 1680.104661] ? lock_downgrade+0x6d0/0x6d0 [ 1680.105249] ? rwlock_bug.part.0+0x90/0x90 [ 1680.105855] security_kernfs_init_security+0x4e/0xb0 [ 1680.106586] __kernfs_new_node+0x531/0x860 [ 1680.107248] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1680.107917] ? cpumask_next+0x1f/0x30 [ 1680.108457] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1680.109055] ? pcpu_alloc+0x12a/0x1240 [ 1680.109557] kernfs_new_node+0x18d/0x250 [ 1680.110095] kernfs_create_dir_ns+0x49/0x160 [ 1680.110640] cgroup_mkdir+0x318/0xf50 [ 1680.111115] ? cgroup_destroy_locked+0x710/0x710 [ 1680.111774] kernfs_iop_mkdir+0x14d/0x1e0 [ 1680.112286] vfs_mkdir+0x493/0x750 [ 1680.112726] do_mkdirat+0x150/0x2b0 [ 1680.113176] ? user_path_create+0xf0/0xf0 [ 1680.113689] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.114360] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.114994] do_syscall_64+0x33/0x40 [ 1680.115451] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.116075] RIP: 0033:0x7f510ba9db19 [ 1680.116529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1680.118804] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1680.119749] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1680.120624] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1680.121496] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.122377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1680.123251] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:51:58 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000040)="06349637dda0e73a4f445861dfcc11df63f40660fc51900a0ff03db285359ec647db5281ad88c129af7903f5b12e2f78a0413f463b0f5f9bb5d7ecdbf1cbc90812c14426458f4d2dcd2a04dcd6a0b92cbc5f0e084c722bb99e47d88bae3e3d1920c5f8784347de77700669417a590d4243084f70771f3dd58bf0d9b4c954af8f436dc5f501", 0x85}, {&(0x7f0000000140)="9ff17d68c24f775a345b773855114bf19d63b2b7b92c60c83f0815e96174b393ecc285af1696b49d7f95a7eef7e50daeeb5b3f6fe797e86fafe332e7b0e317e1cccb50847046825ed4c0f33fb6d4dd3933d781a1cd7336f30aa973cddd6b4f7c087c53927176e3b4ccf4921fedeeaac3375fdcc10c809f5cb37647cee182fd69d6d6a78aa28e78f533dc11ec974a14335697f1682c9af27d5c68f8a52ea3199625dd524777ed6fe5f60b0df3307c39052a93f4f8357d16b06cfda4528b324d04b2b4c61eb976f5", 0xc7}, {&(0x7f0000000240)="74240b2cc88cfc1b80aeef63b4a00e44f77031c22e1893d669e56935a406b59a3cd14e48c30f73f9cd8a8721a7bbef9d8cf8997a2967f651e88c18ebfb59335aafa68dbb7970b14e408e5c1ec5558356c9880746bbb0ef410a2f61e5b0da7172a39f788c894a5a918ea140dc765537b21a0fdf48f68b043660f768f4046a68fa007cf11d1bb0188bd938f307c2c9ff03ef9c663674a08e7ab45d462eebbd34b0b16f59668042251ba1026a7340d2525f9829694d4d7becd95b1a82fb0d0dbf6a40981a7ba09e21b36f1ee1a4486ecb16e06c4561082a5ca4fc6c", 0xda}, {&(0x7f0000000340)="80e0b85cdc18d09031c572e82c960015e871f9ef77db51940735d8639557a48722876ea4b3116a3bd5386d2af67d39fcfb6a4e1151c4f26618d1557c607a0142189515a4f3c2c1cd3e08d088ef1b07fcece2081cea590f71728877ef7eb9b69a47fc2ee4c807f915de3ee22cd958e2f30e1b7880f436dae8469ab52b172e154a82b5925e16fa33ff5a", 0x89}], 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:51:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 33) 01:51:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x25}, {0x6}]}, 0x10) 01:51:58 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2b2c, &(0x7f0000000140)={0x0, 0x0, 0x10}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000440)={&(0x7f0000000240)=@hci, 0x80, 0x0}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x42, 0x2) r5 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000240)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x8, &(0x7f00000024c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x7, 0x0, 0x1}, 0x0) r8 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x5e9) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r11}}, 0x0) syz_io_uring_submit(r6, r10, &(0x7f0000000080)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, r3, 0x0, 0x0, 0x0, 0x101, 0x1}, 0x80000001) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x5c33, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x3344, &(0x7f0000000300)={0x0, 0x5276, 0x20, 0x0, 0x12}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 01:51:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) [ 1680.216275] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1680.217472] EXT4-fs (loop1): group descriptors corrupted! [ 1680.224134] FAULT_INJECTION: forcing a failure. [ 1680.224134] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1680.225579] CPU: 0 PID: 9882 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1680.226442] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.227453] Call Trace: [ 1680.227782] dump_stack+0x107/0x167 [ 1680.228230] should_fail.cold+0x5/0xa [ 1680.228700] __alloc_pages_nodemask+0x182/0x600 [ 1680.229273] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1680.230032] ? find_get_entry+0x2c8/0x740 [ 1680.230535] ? lru_cache_add+0x45c/0x800 [ 1680.231040] alloc_pages_current+0x187/0x280 [ 1680.231578] __page_cache_alloc+0x2d2/0x360 [ 1680.232110] pagecache_get_page+0x2c7/0xc80 [ 1680.232641] grab_cache_page_write_begin+0x64/0xa0 [ 1680.233243] ext4_move_extents+0x1224/0x3050 [ 1680.233802] ? lock_acquire+0x197/0x470 [ 1680.234307] ? lock_acquire+0x197/0x470 [ 1680.234795] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1680.235433] ? lock_release+0x680/0x680 [ 1680.235938] __ext4_ioctl+0x302e/0x4190 [ 1680.236432] ? ext4_reset_inode_seed+0x450/0x450 [ 1680.237013] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1680.237652] ? find_held_lock+0x2c/0x110 [ 1680.238193] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1680.238898] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1680.239529] ? do_vfs_ioctl+0x283/0x10d0 [ 1680.240024] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1680.240662] ? generic_block_fiemap+0x60/0x60 [ 1680.241208] ? lock_downgrade+0x6d0/0x6d0 [ 1680.241718] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1680.242326] ? wait_for_completion_io+0x270/0x270 [ 1680.242949] ? selinux_file_ioctl+0xb6/0x270 [ 1680.243510] ? __ext4_ioctl+0x4190/0x4190 [ 1680.244039] __x64_sys_ioctl+0x19a/0x210 [ 1680.244540] do_syscall_64+0x33/0x40 [ 1680.244995] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.245618] RIP: 0033:0x7fb08f3deb19 [ 1680.246082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1680.248305] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1680.249237] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1680.250144] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1680.251010] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.251874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1680.252746] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:52:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 21) 01:52:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0), 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:52:12 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2b2c, &(0x7f0000000140)={0x0, 0x0, 0x10}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000440)={&(0x7f0000000240)=@hci, 0x80, 0x0}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x42, 0x2) r5 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000240)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x8, &(0x7f00000024c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x7, 0x0, 0x1}, 0x0) r8 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x5e9) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r11}}, 0x0) syz_io_uring_submit(r6, r10, &(0x7f0000000080)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, r3, 0x0, 0x0, 0x0, 0x101, 0x1}, 0x80000001) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x5c33, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x3344, &(0x7f0000000300)={0x0, 0x5276, 0x20, 0x0, 0x12}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 01:52:12 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x800, 0x9, 0x67, 0x5, 0x16, "992c6846a492ffbd214ef12863338b1e463675"}) 01:52:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 34) 01:52:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x28}, {0x6}]}, 0x10) 01:52:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:52:12 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x6, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1693.543679] FAULT_INJECTION: forcing a failure. [ 1693.543679] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.545183] CPU: 0 PID: 9903 Comm: syz-executor.4 Not tainted 5.10.227 #1 01:52:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x2c}, {0x6}]}, 0x10) [ 1693.546012] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1693.547033] Call Trace: [ 1693.547359] dump_stack+0x107/0x167 [ 1693.547804] should_fail.cold+0x5/0xa [ 1693.548272] ? create_object.isra.0+0x3a/0xa20 [ 1693.548837] should_failslab+0x5/0x20 [ 1693.549301] kmem_cache_alloc+0x5b/0x310 [ 1693.549804] create_object.isra.0+0x3a/0xa20 [ 1693.550336] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1693.554981] __kmalloc_track_caller+0x177/0x370 [ 1693.555548] ? security_context_to_sid_core+0xb4/0x890 [ 1693.556227] kmemdup_nul+0x2d/0xa0 [ 1693.556680] security_context_to_sid_core+0xb4/0x890 [ 1693.557328] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 1693.558016] ? do_raw_spin_lock+0x121/0x260 [ 1693.558569] ? rwlock_bug.part.0+0x90/0x90 [ 1693.559089] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1693.559677] ? do_raw_spin_unlock+0x4f/0x220 [ 1693.560213] ? _raw_spin_unlock+0x1a/0x30 [ 1693.560721] security_context_to_sid+0x35/0x50 [ 1693.561281] selinux_kernfs_init_security+0x19d/0x4c0 [ 1693.561913] ? selinux_file_mprotect+0x610/0x610 [ 1693.562499] ? find_held_lock+0x2c/0x110 [ 1693.562999] ? __kernfs_new_node+0x2ad/0x860 [ 1693.563536] ? lock_downgrade+0x6d0/0x6d0 [ 1693.564041] ? rwlock_bug.part.0+0x90/0x90 [ 1693.564560] security_kernfs_init_security+0x4e/0xb0 [ 1693.565180] __kernfs_new_node+0x531/0x860 [ 1693.565700] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1693.566277] ? cpumask_next+0x1f/0x30 [ 1693.566753] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1693.567323] ? pcpu_alloc+0x12a/0x1240 [ 1693.567808] kernfs_new_node+0x18d/0x250 [ 1693.568306] kernfs_create_dir_ns+0x49/0x160 [ 1693.568846] cgroup_mkdir+0x318/0xf50 [ 1693.569316] ? cgroup_destroy_locked+0x710/0x710 [ 1693.569893] kernfs_iop_mkdir+0x14d/0x1e0 [ 1693.570409] vfs_mkdir+0x493/0x750 [ 1693.570853] do_mkdirat+0x150/0x2b0 [ 1693.571295] ? user_path_create+0xf0/0xf0 [ 1693.571805] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1693.572437] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1693.573065] do_syscall_64+0x33/0x40 [ 1693.573515] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1693.574133] RIP: 0033:0x7f510ba9db19 [ 1693.574597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1693.576823] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1693.577752] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1693.578625] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1693.579485] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1693.580350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1693.581211] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:52:12 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/42, 0x2a}, {&(0x7f0000000040)=""/154, 0x9a}], 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:52:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) [ 1693.611557] FAULT_INJECTION: forcing a failure. [ 1693.611557] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.613059] CPU: 1 PID: 9920 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1693.613898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1693.614929] Call Trace: [ 1693.615258] dump_stack+0x107/0x167 [ 1693.615706] should_fail.cold+0x5/0xa [ 1693.616177] ? ext4_find_extent+0xa77/0xd70 [ 1693.616708] should_failslab+0x5/0x20 [ 1693.617175] __kmalloc+0x72/0x390 [ 1693.617604] ext4_find_extent+0xa77/0xd70 [ 1693.618117] ? add_to_page_cache_locked+0x40/0x40 [ 1693.618732] mext_check_coverage.constprop.0+0x223/0x3e0 [ 1693.619401] ? ext4_multi_mount_protect+0xab0/0xab0 [ 1693.620010] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1693.620632] ? wait_on_page_writeback+0xb9/0x240 [ 1693.621210] ext4_move_extents+0x12e0/0x3050 [ 1693.621769] ? lock_acquire+0x197/0x470 [ 1693.622261] ? lock_acquire+0x197/0x470 [ 1693.622757] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1693.623398] ? lock_release+0x680/0x680 [ 1693.623908] __ext4_ioctl+0x302e/0x4190 [ 1693.624401] ? ext4_reset_inode_seed+0x450/0x450 [ 1693.624979] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1693.625619] ? find_held_lock+0x2c/0x110 [ 1693.626128] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1693.626840] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1693.627469] ? do_vfs_ioctl+0x283/0x10d0 [ 1693.627965] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1693.628601] ? generic_block_fiemap+0x60/0x60 [ 1693.629146] ? lock_downgrade+0x6d0/0x6d0 [ 1693.629653] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1693.630242] ? wait_for_completion_io+0x270/0x270 [ 1693.630858] ? selinux_file_ioctl+0xb6/0x270 [ 1693.631399] ? __ext4_ioctl+0x4190/0x4190 [ 1693.631905] __x64_sys_ioctl+0x19a/0x210 [ 1693.632401] do_syscall_64+0x33/0x40 [ 1693.632857] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1693.633482] RIP: 0033:0x7fb08f3deb19 [ 1693.633937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1693.636187] RSP: 002b:00007fb08c933188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1693.637115] RAX: ffffffffffffffda RBX: 00007fb08f4f2020 RCX: 00007fb08f3deb19 [ 1693.637981] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1693.638861] RBP: 00007fb08c9331d0 R08: 0000000000000000 R09: 0000000000000000 [ 1693.639728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1693.640596] R13: 00007ffe741e591f R14: 00007fb08c933300 R15: 0000000000022000 [ 1707.413527] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1707.432932] FAULT_INJECTION: forcing a failure. [ 1707.432932] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.434349] CPU: 1 PID: 9948 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1707.435202] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1707.436221] Call Trace: [ 1707.436551] dump_stack+0x107/0x167 [ 1707.437002] should_fail.cold+0x5/0xa [ 1707.437478] ? create_object.isra.0+0x3a/0xa20 [ 1707.438041] should_failslab+0x5/0x20 [ 1707.438511] kmem_cache_alloc+0x5b/0x310 [ 1707.439086] ? lock_downgrade+0x6d0/0x6d0 [ 1707.439597] create_object.isra.0+0x3a/0xa20 [ 1707.440137] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1707.440764] __kmalloc+0x16e/0x390 [ 1707.441209] ext4_find_extent+0xa77/0xd70 [ 1707.441723] ? add_to_page_cache_locked+0x40/0x40 [ 1707.442321] mext_check_coverage.constprop.0+0x223/0x3e0 [ 1707.443000] ? ext4_multi_mount_protect+0xab0/0xab0 [ 1707.443611] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1707.444245] ? wait_on_page_writeback+0xb9/0x240 [ 1707.444829] ext4_move_extents+0x12e0/0x3050 [ 1707.445396] ? lock_acquire+0x197/0x470 [ 1707.445893] ? lock_acquire+0x197/0x470 [ 1707.446388] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1707.447053] ? lock_release+0x680/0x680 [ 1707.447561] __ext4_ioctl+0x302e/0x4190 [ 1707.448055] ? ext4_reset_inode_seed+0x450/0x450 [ 1707.448639] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1707.449277] ? find_held_lock+0x2c/0x110 [ 1707.449784] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1707.450483] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1707.451126] ? do_vfs_ioctl+0x283/0x10d0 [ 1707.451620] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1707.452259] ? generic_block_fiemap+0x60/0x60 [ 1707.452805] ? lock_downgrade+0x6d0/0x6d0 [ 1707.453314] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1707.453904] ? wait_for_completion_io+0x270/0x270 [ 1707.454504] ? selinux_file_ioctl+0xb6/0x270 [ 1707.455060] ? __ext4_ioctl+0x4190/0x4190 [ 1707.455567] __x64_sys_ioctl+0x19a/0x210 [ 1707.456063] do_syscall_64+0x33/0x40 [ 1707.456516] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1707.457140] RIP: 0033:0x7fb08f3deb19 [ 1707.457594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.459847] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1707.460775] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1707.461642] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 01:52:25 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b0f, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x7, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) writev(r1, &(0x7f0000001440)=[{&(0x7f0000000040)="bcafc2bda9fa6d7e9e808ebad296db58f31b5a1800dc8aedf3f7f0fc4c6793149b067c6f24fc", 0x26}, {&(0x7f0000000080)="45a18070fa55", 0x6}, {&(0x7f0000000140)="0401e64f4d18abe8909c8c20ff67e5621a631b7ae3b659c6ac0390d8294b923060ad36ed12a5b46bdc3b382fa96577f21e4e592ba2080d57ea7fbc0c598414d3646a03154771b7a287d57dbd8399960ae2244fba4dc0e54deeff428c6a6218520d7093543a80689d6ae8139e6d5755fd944d0b930f744872820a2dd80501006f3724b137b6d4d3b7f16f420e97e275f844a92a", 0x93}, {&(0x7f00000000c0)="01201e5bbdcdb6c229b6b63b8cf8cbd8a745dbc3dea0c8aa73b34e1c6fcee34b0741742d822ab30002a6c22c1c", 0x2d}, {&(0x7f0000000200)="c0a4da67", 0x4}, {&(0x7f0000000240)="adf5c41afed971cd64f946b8e9800aa5038261ac2fa22984ed5e56dc6ad2a3270d1e650487ae01f1735eece667d79efb9a49746912c6c883f2ed75e95492da362a3535bdfb7f1f4b4983f9fae1617f8718383bdf7bde1cbcfb4b6e6ba0c552a6675463b94fc93eeafe88bd87c69548a11cedeee29d0710c5ea053c3cb287b62238c3f7003ec2e508558d2f227b0c57a5ca334b35f9526504cf7677ac05f9768bc459e020c6de31530b20d28851cf69a266a919d09e4858b2c9d1cf9515394af7887dde5b6070c9bafdac01a7f3786bf353840bebe0", 0xd5}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="67fe87ea69fb401da5bc636e4abd6fa7ad82b3ad0f38e0ad5bdbb1a1e584f16c1fa4a0e9fe5a2581355b6d3553e4df1c6292f53aeb1ae6c9e3320388024c78fafcfc83691b498c88932236ee40bba044c013fb1e4ab052555c39d469e993b20717bca2160b8ec8b80a3e0bf69df25a212e71f8a61d71d0774c7f0f6355", 0x7d}, {&(0x7f00000013c0)="0315c0bb3e425a4b506cd9c60eee0b04f0efb6a9eb6f9d74be5bd45e26efce3bffe138", 0x23}, {&(0x7f0000001400)}], 0xa) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000000)={0x7fffffff, 0x21, 0x9, 0x2}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000001400)={0x2, 0xfff7, 0x2, 0x200, 0xc, "e12a3deed21eca88"}) 01:52:25 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x0, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:52:25 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x7, 0x4) syz_open_dev$tty1(0xc, 0x4, 0x1) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$read(0xb, 0x0, &(0x7f0000000880)=""/191, 0xbf) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r4, 0xb99771294b5ad721}, 0x14}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x2fc41b6}}, './file0\x00'}) unshare(0x48020200) 01:52:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0), 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:52:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x2d}, {0x6}]}, 0x10) 01:52:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 22) 01:52:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 35) 01:52:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:52:25 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x400401, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000180)={r1, 0x4, 0xfff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x1) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) pread64(r0, &(0x7f0000000000)=""/182, 0xb6, 0x600000000000000) [ 1707.462516] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.471699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1707.472570] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 [ 1707.488254] FAULT_INJECTION: forcing a failure. [ 1707.488254] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.490408] CPU: 0 PID: 9950 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1707.491261] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1707.492278] Call Trace: [ 1707.492608] dump_stack+0x107/0x167 [ 1707.493055] should_fail.cold+0x5/0xa [ 1707.493534] should_failslab+0x5/0x20 [ 1707.494007] __kmalloc_track_caller+0x79/0x370 [ 1707.494570] ? sidtab_sid2str_get+0x17e/0x720 [ 1707.495146] kmemdup+0x23/0x50 [ 1707.495543] sidtab_sid2str_get+0x17e/0x720 [ 1707.496075] sidtab_entry_to_string+0x33/0x110 [ 1707.496638] security_sid_to_context_core+0x33c/0x5d0 [ 1707.497276] selinux_kernfs_init_security+0x239/0x4c0 [ 1707.497908] ? selinux_file_mprotect+0x610/0x610 [ 1707.498492] ? find_held_lock+0x2c/0x110 [ 1707.499005] ? __kernfs_new_node+0x2ad/0x860 [ 1707.499556] ? rwlock_bug.part.0+0x90/0x90 [ 1707.500077] security_kernfs_init_security+0x4e/0xb0 [ 1707.500698] __kernfs_new_node+0x531/0x860 [ 1707.501219] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1707.501805] ? cpumask_next+0x1f/0x30 [ 1707.502273] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1707.502844] ? pcpu_alloc+0x12a/0x1240 [ 1707.503341] kernfs_new_node+0x18d/0x250 [ 1707.503839] kernfs_create_dir_ns+0x49/0x160 [ 1707.504380] cgroup_mkdir+0x318/0xf50 [ 1707.504850] ? cgroup_destroy_locked+0x710/0x710 [ 1707.505428] kernfs_iop_mkdir+0x14d/0x1e0 [ 1707.505936] vfs_mkdir+0x493/0x750 [ 1707.506374] do_mkdirat+0x150/0x2b0 [ 1707.506821] ? user_path_create+0xf0/0xf0 [ 1707.507346] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1707.507986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1707.508620] do_syscall_64+0x33/0x40 [ 1707.509073] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1707.509700] RIP: 0033:0x7f510ba9db19 [ 1707.510153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.516440] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1707.517375] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1707.518242] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1707.519131] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.519996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1707.520866] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:52:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x30}, {0x6}]}, 0x10) 01:52:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 36) [ 1707.595551] FAULT_INJECTION: forcing a failure. [ 1707.595551] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.597030] CPU: 1 PID: 9960 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1707.597868] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1707.598883] Call Trace: [ 1707.599229] dump_stack+0x107/0x167 [ 1707.599699] should_fail.cold+0x5/0xa [ 1707.600191] ? create_object.isra.0+0x3a/0xa20 [ 1707.600785] should_failslab+0x5/0x20 [ 1707.601255] kmem_cache_alloc+0x5b/0x310 [ 1707.601755] ? lock_downgrade+0x6d0/0x6d0 [ 1707.602268] create_object.isra.0+0x3a/0xa20 [ 1707.602807] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1707.603450] __kmalloc+0x16e/0x390 [ 1707.603893] ext4_find_extent+0xa77/0xd70 [ 1707.604403] ? add_to_page_cache_locked+0x40/0x40 [ 1707.604997] mext_check_coverage.constprop.0+0x223/0x3e0 [ 1707.605659] ? ext4_multi_mount_protect+0xab0/0xab0 [ 1707.606265] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1707.606885] ? wait_on_page_writeback+0xb9/0x240 [ 1707.607484] ext4_move_extents+0x12e0/0x3050 [ 1707.608045] ? lock_acquire+0x197/0x470 [ 1707.608537] ? lock_acquire+0x197/0x470 [ 1707.609022] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1707.609668] ? lock_release+0x680/0x680 [ 1707.610170] __ext4_ioctl+0x302e/0x4190 [ 1707.610664] ? ext4_reset_inode_seed+0x450/0x450 [ 1707.611256] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1707.611894] ? find_held_lock+0x2c/0x110 [ 1707.612403] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1707.613103] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1707.613732] ? do_vfs_ioctl+0x283/0x10d0 [ 1707.614225] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1707.614863] ? generic_block_fiemap+0x60/0x60 [ 1707.615422] ? lock_downgrade+0x6d0/0x6d0 [ 1707.615933] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1707.616529] ? wait_for_completion_io+0x270/0x270 [ 1707.617124] ? selinux_file_ioctl+0xb6/0x270 [ 1707.617662] ? __ext4_ioctl+0x4190/0x4190 [ 1707.618170] __x64_sys_ioctl+0x19a/0x210 01:52:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0), 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:52:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:52:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x34}, {0x6}]}, 0x10) 01:52:26 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x0, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1707.618674] do_syscall_64+0x33/0x40 [ 1707.626998] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1707.627624] RIP: 0033:0x7fb08f3deb19 [ 1707.628080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.630317] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1707.631259] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1707.632126] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1707.632994] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.633861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1707.634728] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 [ 1707.649114] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 01:52:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x10000005, 0x67, 0x5, 0xb, "1ee954c02189700322374b4f9c6512fb423675"}) 01:52:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x35}, {0x6}]}, 0x10) 01:52:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 23) 01:52:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 37) 01:52:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{0x0}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:52:26 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x204a, 0x0, 0x2, 0x4, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x42800) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0xd0, 0x2, 0x7, 0x0, 0x8000, 0x2a2ea, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000100), 0xa}, 0x20, 0x80, 0xfff, 0x2, 0xfffffffffffff40c, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x3, r0, 0x9) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x80080, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x2, 0x0, r1}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x80000, 0xc925) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xfe, 0x7f}}, './file0\x00'}) readv(r3, &(0x7f0000000180)=[{&(0x7f0000000240)=""/145, 0x91}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000000300)=""/248, 0xf8}], 0x3) clone3(&(0x7f0000000ac0)={0x17412e500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1707.819192] FAULT_INJECTION: forcing a failure. [ 1707.819192] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.820653] CPU: 1 PID: 9978 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1707.821482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1707.822491] Call Trace: [ 1707.822817] dump_stack+0x107/0x167 [ 1707.823275] should_fail.cold+0x5/0xa [ 1707.823747] should_failslab+0x5/0x20 [ 1707.824213] __kmalloc_track_caller+0x79/0x370 [ 1707.824774] ? security_context_to_sid_core+0xb4/0x890 [ 1707.825421] kmemdup_nul+0x2d/0xa0 [ 1707.825857] security_context_to_sid_core+0xb4/0x890 01:52:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x40000, 0x0, 0xffffffff, 0x7, 0x0, 0x51c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:52:26 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x0, r2, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) [ 1707.826479] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 1707.837481] ? do_raw_spin_lock+0x121/0x260 [ 1707.837493] ? rwlock_bug.part.0+0x90/0x90 [ 1707.837506] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1707.837520] ? do_raw_spin_unlock+0x4f/0x220 [ 1707.837532] ? _raw_spin_unlock+0x1a/0x30 [ 1707.837547] security_context_to_sid+0x35/0x50 [ 1707.837565] selinux_kernfs_init_security+0x19d/0x4c0 [ 1707.837577] ? selinux_file_mprotect+0x610/0x610 [ 1707.837589] ? find_held_lock+0x2c/0x110 [ 1707.837607] ? __kernfs_new_node+0x2ad/0x860 [ 1707.837619] ? lock_downgrade+0x6d0/0x6d0 [ 1707.837630] ? rwlock_bug.part.0+0x90/0x90 [ 1707.837645] security_kernfs_init_security+0x4e/0xb0 [ 1707.837660] __kernfs_new_node+0x531/0x860 [ 1707.837679] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1707.837694] ? cpumask_next+0x1f/0x30 [ 1707.837706] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1707.837721] ? pcpu_alloc+0x12a/0x1240 [ 1707.837737] kernfs_new_node+0x18d/0x250 [ 1707.837753] kernfs_create_dir_ns+0x49/0x160 [ 1707.837770] cgroup_mkdir+0x318/0xf50 [ 1707.837786] ? cgroup_destroy_locked+0x710/0x710 [ 1707.837798] kernfs_iop_mkdir+0x14d/0x1e0 [ 1707.837812] vfs_mkdir+0x493/0x750 [ 1707.837826] do_mkdirat+0x150/0x2b0 [ 1707.837839] ? user_path_create+0xf0/0xf0 [ 1707.837854] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1707.837866] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1707.837879] do_syscall_64+0x33/0x40 [ 1707.837891] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1707.837899] RIP: 0033:0x7f510ba9db19 [ 1707.837911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.837918] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1707.837931] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1707.837938] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1707.837945] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.837952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1707.837959] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1707.984197] FAULT_INJECTION: forcing a failure. [ 1707.984197] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.984216] CPU: 0 PID: 9985 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1707.984224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1707.984229] Call Trace: [ 1707.984249] dump_stack+0x107/0x167 [ 1707.984267] should_fail.cold+0x5/0xa [ 1707.984287] ? create_object.isra.0+0x3a/0xa20 [ 1707.984305] should_failslab+0x5/0x20 [ 1707.984321] kmem_cache_alloc+0x5b/0x310 [ 1707.984343] create_object.isra.0+0x3a/0xa20 [ 1707.984356] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1707.984375] __kmalloc+0x16e/0x390 [ 1707.984397] ext4_find_extent+0xa77/0xd70 [ 1707.984426] mext_check_coverage.constprop.0+0x223/0x3e0 [ 1707.984447] ? ext4_multi_mount_protect+0xab0/0xab0 [ 1707.984461] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1707.984482] ? wait_on_page_writeback+0xb9/0x240 [ 1707.984503] ext4_move_extents+0x131b/0x3050 [ 1707.984550] ? lock_acquire+0x197/0x470 [ 1707.984574] ? lock_acquire+0x197/0x470 [ 1707.984591] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1707.984608] ? lock_release+0x680/0x680 [ 1707.984652] __ext4_ioctl+0x302e/0x4190 [ 1707.984684] ? ext4_reset_inode_seed+0x450/0x450 [ 1707.984701] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1707.984718] ? find_held_lock+0x2c/0x110 [ 1707.984750] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1707.984766] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1707.984783] ? do_vfs_ioctl+0x283/0x10d0 [ 1707.984797] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1707.984813] ? generic_block_fiemap+0x60/0x60 [ 1707.984827] ? lock_downgrade+0x6d0/0x6d0 [ 1707.984846] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1707.984865] ? wait_for_completion_io+0x270/0x270 [ 1707.984891] ? selinux_file_ioctl+0xb6/0x270 [ 1707.984909] ? __ext4_ioctl+0x4190/0x4190 [ 1707.984926] __x64_sys_ioctl+0x19a/0x210 [ 1707.984943] do_syscall_64+0x33/0x40 [ 1707.984958] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1707.984968] RIP: 0033:0x7fb08f3deb19 [ 1707.984984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.984992] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1707.985009] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1707.985018] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1707.985026] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.985035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1707.985045] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:52:39 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1720.942297] FAULT_INJECTION: forcing a failure. 01:52:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x3c}, {0x6}]}, 0x10) 01:52:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{0x0}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:52:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 24) 01:52:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 38) 01:52:39 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:52:39 executing program 2: getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=""/7, &(0x7f0000000000)=0x49) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000080)=""/87) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) fork() shmctl$SHM_UNLOCK(r0, 0xc) [ 1720.942297] name failslab, interval 1, probability 0, space 0, times 0 [ 1720.943805] CPU: 0 PID: 10008 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1720.955640] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1720.956648] Call Trace: [ 1720.956976] dump_stack+0x107/0x167 [ 1720.957420] should_fail.cold+0x5/0xa [ 1720.957890] should_failslab+0x5/0x20 [ 1720.958352] __kmalloc_track_caller+0x79/0x370 [ 1720.958908] ? sidtab_sid2str_get+0x17e/0x720 [ 1720.959466] kmemdup+0x23/0x50 [ 1720.959864] sidtab_sid2str_get+0x17e/0x720 [ 1720.960392] sidtab_entry_to_string+0x33/0x110 [ 1720.960953] security_sid_to_context_core+0x33c/0x5d0 [ 1720.961595] selinux_kernfs_init_security+0x239/0x4c0 [ 1720.962223] ? selinux_file_mprotect+0x610/0x610 [ 1720.962800] ? find_held_lock+0x2c/0x110 [ 1720.963300] ? __kernfs_new_node+0x2ad/0x860 [ 1720.963853] ? rwlock_bug.part.0+0x90/0x90 [ 1720.964376] security_kernfs_init_security+0x4e/0xb0 [ 1720.964996] __kernfs_new_node+0x531/0x860 [ 1720.965518] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1720.966102] ? cpumask_next+0x1f/0x30 [ 1720.966569] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1720.967139] ? pcpu_alloc+0x12a/0x1240 [ 1720.967635] kernfs_new_node+0x18d/0x250 [ 1720.968134] kernfs_create_dir_ns+0x49/0x160 [ 1720.968674] cgroup_mkdir+0x318/0xf50 [ 1720.969145] ? cgroup_destroy_locked+0x710/0x710 [ 1720.969724] kernfs_iop_mkdir+0x14d/0x1e0 [ 1720.970238] vfs_mkdir+0x493/0x750 [ 1720.970674] do_mkdirat+0x150/0x2b0 [ 1720.971120] ? user_path_create+0xf0/0xf0 [ 1720.971648] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1720.972289] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1720.972921] do_syscall_64+0x33/0x40 [ 1720.973379] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1720.974007] RIP: 0033:0x7f510ba9db19 [ 1720.974464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.976724] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1720.977652] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1720.978525] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1720.979393] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1720.980289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1720.981154] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:52:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) [ 1721.037093] FAULT_INJECTION: forcing a failure. [ 1721.037093] name failslab, interval 1, probability 0, space 0, times 0 [ 1721.038510] CPU: 1 PID: 10015 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1721.039358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1721.040390] Call Trace: [ 1721.040719] dump_stack+0x107/0x167 [ 1721.041171] should_fail.cold+0x5/0xa [ 1721.041642] ? ext4_find_extent+0xa77/0xd70 [ 1721.042179] should_failslab+0x5/0x20 [ 1721.042647] __kmalloc+0x72/0x390 [ 1721.043081] ext4_find_extent+0xa77/0xd70 [ 1721.043615] ext4_swap_extents+0x321/0x14c0 [ 1721.044152] ? mext_check_coverage.constprop.0+0x2a7/0x3e0 [ 1721.044838] ? kfree+0xd7/0x340 [ 1721.045253] ? ext4_get_es_cache+0x600/0x600 [ 1721.045799] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1721.046431] ext4_move_extents+0x2559/0x3050 [ 1721.046998] ? lock_acquire+0x197/0x470 [ 1721.047512] ? lock_acquire+0x197/0x470 [ 1721.048005] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1721.048646] ? lock_release+0x680/0x680 [ 1721.049151] __ext4_ioctl+0x302e/0x4190 [ 1721.049643] ? ext4_reset_inode_seed+0x450/0x450 [ 1721.050221] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1721.050859] ? find_held_lock+0x2c/0x110 [ 1721.051368] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1721.052085] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1721.052717] ? do_vfs_ioctl+0x283/0x10d0 [ 1721.053211] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1721.053849] ? generic_block_fiemap+0x60/0x60 [ 1721.054397] ? lock_downgrade+0x6d0/0x6d0 [ 1721.054906] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1721.055503] ? wait_for_completion_io+0x270/0x270 [ 1721.056100] ? selinux_file_ioctl+0xb6/0x270 [ 1721.056639] ? __ext4_ioctl+0x4190/0x4190 [ 1721.057145] __x64_sys_ioctl+0x19a/0x210 [ 1721.057644] do_syscall_64+0x33/0x40 [ 1721.058100] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1721.058726] RIP: 0033:0x7fb08f3deb19 [ 1721.059182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1721.061441] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1721.062371] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1721.063240] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1721.064128] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1721.064997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1721.065866] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:52:52 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:52:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 39) 01:52:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:52:52 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r2, 0x4, 0x42800) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r4, 0xb99771294b5ad721}, 0x14}}, 0x0) fcntl$dupfd(r1, 0x406, r3) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000000)) 01:52:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x3d}, {0x6}]}, 0x10) 01:52:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{0x0}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:52:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 25) 01:52:52 executing program 2: sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000040)='7', 0x1}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000002480)={@mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200020}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000340), 0x1000) bind(0xffffffffffffffff, &(0x7f00000002c0)=@nfc={0x27, 0x0, 0x0, 0x1}, 0x80) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x100000001) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r4, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r5, 0xb99771294b5ad721}, 0x14}}, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r4, 0xc038943b, &(0x7f0000000140)={0x5, 0x28, '\x00', 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) 01:52:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x44}, {0x6}]}, 0x10) 01:52:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:52:52 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1733.982475] FAULT_INJECTION: forcing a failure. [ 1733.982475] name failslab, interval 1, probability 0, space 0, times 0 [ 1733.983958] CPU: 0 PID: 10055 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1733.988762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1733.989765] Call Trace: [ 1733.990098] dump_stack+0x107/0x167 [ 1733.990544] should_fail.cold+0x5/0xa [ 1733.991012] ? create_object.isra.0+0x3a/0xa20 [ 1733.991574] should_failslab+0x5/0x20 [ 1733.992057] kmem_cache_alloc+0x5b/0x310 [ 1733.992559] create_object.isra.0+0x3a/0xa20 [ 1733.993096] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1733.993720] __kmalloc+0x16e/0x390 [ 1733.994167] ext4_find_extent+0xa77/0xd70 [ 1733.994682] ext4_swap_extents+0x321/0x14c0 [ 1733.995210] ? mext_check_coverage.constprop.0+0x2a7/0x3e0 [ 1733.995897] ? kfree+0xd7/0x340 [ 1733.996336] ? ext4_get_es_cache+0x600/0x600 [ 1733.996880] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1733.997503] ext4_move_extents+0x2559/0x3050 [ 1733.998065] ? lock_acquire+0x197/0x470 [ 1733.998556] ? lock_acquire+0x197/0x470 [ 1733.999044] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1733.999685] ? lock_release+0x680/0x680 [ 1734.000218] __ext4_ioctl+0x302e/0x4190 [ 1734.000737] ? ext4_reset_inode_seed+0x450/0x450 [ 1734.001343] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1734.001988] ? find_held_lock+0x2c/0x110 [ 1734.002495] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1734.003194] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1734.003823] ? do_vfs_ioctl+0x283/0x10d0 [ 1734.004341] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1734.004979] ? generic_block_fiemap+0x60/0x60 [ 1734.005525] ? lock_downgrade+0x6d0/0x6d0 [ 1734.006032] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1734.006623] ? wait_for_completion_io+0x270/0x270 [ 1734.007223] ? selinux_file_ioctl+0xb6/0x270 [ 1734.007759] ? __ext4_ioctl+0x4190/0x4190 [ 1734.008283] __x64_sys_ioctl+0x19a/0x210 [ 1734.008784] do_syscall_64+0x33/0x40 [ 1734.009258] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1734.009909] RIP: 0033:0x7fb08f3deb19 [ 1734.010385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1734.012715] RSP: 002b:00007fb08c933188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1734.013641] RAX: ffffffffffffffda RBX: 00007fb08f4f2020 RCX: 00007fb08f3deb19 [ 1734.014505] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1734.015375] RBP: 00007fb08c9331d0 R08: 0000000000000000 R09: 0000000000000000 [ 1734.016260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1734.017126] R13: 00007ffe741e591f R14: 00007fb08c933300 R15: 0000000000022000 01:52:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x45}, {0x6}]}, 0x10) [ 1734.037158] FAULT_INJECTION: forcing a failure. [ 1734.037158] name failslab, interval 1, probability 0, space 0, times 0 [ 1734.038574] CPU: 0 PID: 10050 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1734.039439] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1734.044482] Call Trace: [ 1734.044820] dump_stack+0x107/0x167 [ 1734.045282] should_fail.cold+0x5/0xa [ 1734.045759] ? create_object.isra.0+0x3a/0xa20 [ 1734.046329] should_failslab+0x5/0x20 [ 1734.046803] kmem_cache_alloc+0x5b/0x310 [ 1734.047318] ? sidtab_sid2str_get+0x65/0x720 [ 1734.047862] create_object.isra.0+0x3a/0xa20 [ 1734.048422] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1734.049073] __kmalloc_track_caller+0x177/0x370 [ 1734.049665] ? sidtab_sid2str_get+0x17e/0x720 [ 1734.050245] kmemdup+0x23/0x50 [ 1734.050658] sidtab_sid2str_get+0x17e/0x720 [ 1734.051215] sidtab_entry_to_string+0x33/0x110 [ 1734.051800] security_sid_to_context_core+0x33c/0x5d0 [ 1734.052450] selinux_kernfs_init_security+0x239/0x4c0 [ 1734.053079] ? selinux_file_mprotect+0x610/0x610 [ 1734.053655] ? find_held_lock+0x2c/0x110 [ 1734.054155] ? __kernfs_new_node+0x2ad/0x860 [ 1734.054691] ? rwlock_bug.part.0+0x90/0x90 [ 1734.055209] security_kernfs_init_security+0x4e/0xb0 [ 1734.055826] __kernfs_new_node+0x531/0x860 [ 1734.056369] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1734.056951] ? cpumask_next+0x1f/0x30 [ 1734.057420] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1734.057992] ? pcpu_alloc+0x12a/0x1240 [ 1734.058473] kernfs_new_node+0x18d/0x250 [ 1734.058972] kernfs_create_dir_ns+0x49/0x160 [ 1734.059513] cgroup_mkdir+0x318/0xf50 [ 1734.059991] ? cgroup_destroy_locked+0x710/0x710 [ 1734.060571] kernfs_iop_mkdir+0x14d/0x1e0 [ 1734.061084] vfs_mkdir+0x493/0x750 [ 1734.061520] do_mkdirat+0x150/0x2b0 [ 1734.061970] ? user_path_create+0xf0/0xf0 [ 1734.062480] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1734.063119] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1734.063750] do_syscall_64+0x33/0x40 [ 1734.064215] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1734.064838] RIP: 0033:0x7f510ba9db19 [ 1734.065289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1734.067521] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1734.072477] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1734.073343] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1734.074209] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1734.075073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1734.075950] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:52:52 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, 0xffffffffffffffff, &(0x7f0000000680)='uu', 0x2, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:52:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:52:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:52:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 40) 01:52:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x48}, {0x6}]}, 0x10) 01:52:52 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) socketpair(0x22, 0x4, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) fchmod(r1, 0x131) 01:52:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x4c}, {0x6}]}, 0x10) 01:52:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 26) [ 1734.301032] FAULT_INJECTION: forcing a failure. [ 1734.301032] name failslab, interval 1, probability 0, space 0, times 0 [ 1734.302434] CPU: 1 PID: 10080 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1734.303282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1734.304322] Call Trace: [ 1734.304652] dump_stack+0x107/0x167 [ 1734.305101] should_fail.cold+0x5/0xa [ 1734.305572] ? create_object.isra.0+0x3a/0xa20 [ 1734.306135] should_failslab+0x5/0x20 [ 1734.306603] kmem_cache_alloc+0x5b/0x310 [ 1734.307108] create_object.isra.0+0x3a/0xa20 [ 1734.307643] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1734.320284] __kmalloc+0x16e/0x390 [ 1734.320753] ext4_find_extent+0xa77/0xd70 [ 1734.321295] ext4_swap_extents+0x321/0x14c0 [ 1734.321846] ? mext_check_coverage.constprop.0+0x2a7/0x3e0 [ 1734.322559] ? kfree+0xd7/0x340 [ 1734.322991] ? ext4_get_es_cache+0x600/0x600 [ 1734.323561] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1734.324218] ext4_move_extents+0x2559/0x3050 [ 1734.324780] ? lock_acquire+0x197/0x470 [ 1734.325274] ? lock_acquire+0x197/0x470 [ 1734.325762] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1734.326402] ? lock_release+0x680/0x680 [ 1734.326908] __ext4_ioctl+0x302e/0x4190 [ 1734.327405] ? ext4_reset_inode_seed+0x450/0x450 [ 1734.327992] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1734.328635] ? find_held_lock+0x2c/0x110 [ 1734.329145] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1734.329851] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1734.330486] ? do_vfs_ioctl+0x283/0x10d0 [ 1734.330985] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1734.331628] ? generic_block_fiemap+0x60/0x60 [ 1734.332192] ? lock_downgrade+0x6d0/0x6d0 [ 1734.332702] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1734.333295] ? wait_for_completion_io+0x270/0x270 [ 1734.333935] ? selinux_file_ioctl+0xb6/0x270 [ 1734.334477] ? __ext4_ioctl+0x4190/0x4190 [ 1734.334989] __x64_sys_ioctl+0x19a/0x210 [ 1734.335491] do_syscall_64+0x33/0x40 [ 1734.335972] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1734.336604] RIP: 0033:0x7fb08f3deb19 [ 1734.337062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1734.339309] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1734.340257] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1734.341128] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1734.341999] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1734.342869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1734.348135] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 [ 1734.407122] FAULT_INJECTION: forcing a failure. [ 1734.407122] name failslab, interval 1, probability 0, space 0, times 0 [ 1734.409315] CPU: 0 PID: 10087 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1734.410165] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1734.411178] Call Trace: [ 1734.411511] dump_stack+0x107/0x167 [ 1734.411979] should_fail.cold+0x5/0xa [ 1734.416321] ? __kernfs_iattrs+0xbc/0x470 [ 1734.416834] should_failslab+0x5/0x20 [ 1734.417301] kmem_cache_alloc+0x5b/0x310 [ 1734.417803] __kernfs_iattrs+0xbc/0x470 [ 1734.418291] kernfs_xattr_set+0x2b/0x80 [ 1734.418783] selinux_kernfs_init_security+0x26d/0x4c0 [ 1734.419412] ? selinux_file_mprotect+0x610/0x610 [ 1734.424027] ? find_held_lock+0x2c/0x110 [ 1734.424537] ? __kernfs_new_node+0x2ad/0x860 [ 1734.425080] ? rwlock_bug.part.0+0x90/0x90 [ 1734.425601] security_kernfs_init_security+0x4e/0xb0 [ 1734.426221] __kernfs_new_node+0x531/0x860 [ 1734.426746] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1734.427325] ? cpumask_next+0x1f/0x30 [ 1734.427793] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1734.428389] ? pcpu_alloc+0x12a/0x1240 [ 1734.428880] kernfs_new_node+0x18d/0x250 [ 1734.429388] kernfs_create_dir_ns+0x49/0x160 [ 1734.429929] cgroup_mkdir+0x318/0xf50 [ 1734.430399] ? cgroup_destroy_locked+0x710/0x710 [ 1734.430977] kernfs_iop_mkdir+0x14d/0x1e0 [ 1734.431484] vfs_mkdir+0x493/0x750 [ 1734.431919] do_mkdirat+0x150/0x2b0 [ 1734.436386] ? user_path_create+0xf0/0xf0 [ 1734.436925] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1734.437591] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1734.438250] do_syscall_64+0x33/0x40 [ 1734.438730] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1734.439381] RIP: 0033:0x7f510ba9db19 [ 1734.439837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1734.442089] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1734.443016] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1734.443883] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1734.444763] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1734.445629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1734.446497] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:53:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:53:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x4c}, {0x6}]}, 0x10) 01:53:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 27) 01:53:07 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, 0x0, 0x0, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:53:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:53:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x4d}, {0x6}]}, 0x10) 01:53:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 41) 01:53:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x42800) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000000)={0x8, 0x401, 0x8, 0x800, 0x1, "fdc0e63247a918fea96e60131000bd939122c1", 0x8000, 0x9}) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r3, 0xb99771294b5ad721}, 0x14}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r4, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r5, 0xb99771294b5ad721}, 0x14}}, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @random="00001100"}, 0x14) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x800}, 0x4) fstat(r2, &(0x7f0000000040)) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) 01:53:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50}, {0x6}]}, 0x10) [ 1749.405666] FAULT_INJECTION: forcing a failure. [ 1749.405666] name failslab, interval 1, probability 0, space 0, times 0 [ 1749.407096] CPU: 0 PID: 10112 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1749.407943] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1749.408976] Call Trace: [ 1749.409304] dump_stack+0x107/0x167 [ 1749.409753] should_fail.cold+0x5/0xa [ 1749.410224] ? create_object.isra.0+0x3a/0xa20 [ 1749.410789] should_failslab+0x5/0x20 [ 1749.411257] kmem_cache_alloc+0x5b/0x310 [ 1749.411757] ? mark_held_locks+0x9e/0xe0 [ 1749.412260] create_object.isra.0+0x3a/0xa20 [ 1749.412814] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1749.413442] __kmalloc+0x16e/0x390 [ 1749.413884] ext4_find_extent+0xa77/0xd70 [ 1749.414403] ext4_swap_extents+0x361/0x14c0 [ 1749.414933] ? mext_check_coverage.constprop.0+0x2a7/0x3e0 [ 1749.415615] ? kfree+0xd7/0x340 [ 1749.416026] ? ext4_get_es_cache+0x600/0x600 [ 1749.416590] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1749.417215] ext4_move_extents+0x2559/0x3050 [ 1749.417778] ? lock_acquire+0x197/0x470 [ 1749.418273] ? lock_acquire+0x197/0x470 [ 1749.418765] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1749.419414] ? lock_release+0x680/0x680 [ 1749.419924] __ext4_ioctl+0x302e/0x4190 [ 1749.420423] ? ext4_reset_inode_seed+0x450/0x450 [ 1749.421022] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1749.421667] ? find_held_lock+0x2c/0x110 [ 1749.422177] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1749.422881] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1749.423515] ? do_vfs_ioctl+0x283/0x10d0 [ 1749.424013] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1749.424918] ? generic_block_fiemap+0x60/0x60 [ 1749.425470] ? lock_downgrade+0x6d0/0x6d0 [ 1749.425979] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1749.426571] ? wait_for_completion_io+0x270/0x270 [ 1749.427167] ? selinux_file_ioctl+0xb6/0x270 [ 1749.427706] ? __ext4_ioctl+0x4190/0x4190 [ 1749.428216] __x64_sys_ioctl+0x19a/0x210 [ 1749.429053] do_syscall_64+0x33/0x40 [ 1749.430102] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1749.431584] RIP: 0033:0x7fb08f3deb19 [ 1749.432642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1749.437969] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1749.440131] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1749.442192] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1749.444219] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 01:53:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x54}, {0x6}]}, 0x10) [ 1749.446284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1749.453399] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 01:53:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:53:07 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, 0x0, 0x0, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:53:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2644e3, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r2, 0x4, 0x42800) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x40, 0x1, 0x80, 0x6, 0x0, 0x4, 0x1040, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, @perf_config_ext={0x3f, 0x7fffffff}, 0x0, 0xc98, 0xfc3, 0x4, 0x400000000, 0x4, 0x4, 0x0, 0x6, 0x0, 0xfffffffffffff800}, 0x0, 0x4, r2, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x40, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@uid_lt={'uid<', 0xee01}}, {@dont_appraise}]}}) [ 1749.516546] FAULT_INJECTION: forcing a failure. [ 1749.516546] name failslab, interval 1, probability 0, space 0, times 0 [ 1749.519770] CPU: 0 PID: 10106 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1749.526070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1749.528083] Call Trace: [ 1749.528634] dump_stack+0x107/0x167 [ 1749.529104] should_fail.cold+0x5/0xa [ 1749.529598] ? create_object.isra.0+0x3a/0xa20 [ 1749.530157] should_failslab+0x5/0x20 [ 1749.530624] kmem_cache_alloc+0x5b/0x310 [ 1749.531120] ? find_held_lock+0x2c/0x110 [ 1749.531619] create_object.isra.0+0x3a/0xa20 [ 1749.532153] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1749.532800] kmem_cache_alloc+0x159/0x310 [ 1749.533313] __kernfs_iattrs+0xbc/0x470 [ 1749.533806] kernfs_xattr_set+0x2b/0x80 [ 1749.534298] selinux_kernfs_init_security+0x26d/0x4c0 [ 1749.534928] ? selinux_file_mprotect+0x610/0x610 [ 1749.535503] ? find_held_lock+0x2c/0x110 [ 1749.536001] ? __kernfs_new_node+0x2ad/0x860 [ 1749.536546] ? rwlock_bug.part.0+0x90/0x90 [ 1749.537069] security_kernfs_init_security+0x4e/0xb0 [ 1749.537689] __kernfs_new_node+0x531/0x860 [ 1749.538210] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1749.538797] ? cpumask_next+0x1f/0x30 [ 1749.539266] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1749.539838] ? pcpu_alloc+0x12a/0x1240 [ 1749.540321] kernfs_new_node+0x18d/0x250 [ 1749.541280] kernfs_create_dir_ns+0x49/0x160 [ 1749.542530] cgroup_mkdir+0x318/0xf50 [ 1749.543621] ? cgroup_destroy_locked+0x710/0x710 [ 1749.544966] kernfs_iop_mkdir+0x14d/0x1e0 [ 1749.546153] vfs_mkdir+0x493/0x750 01:53:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 42) [ 1749.547149] do_mkdirat+0x150/0x2b0 [ 1749.552620] ? user_path_create+0xf0/0xf0 [ 1749.553129] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1749.553764] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1749.554392] do_syscall_64+0x33/0x40 [ 1749.554843] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1749.555465] RIP: 0033:0x7f510ba9db19 [ 1749.555920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1749.558166] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1749.559091] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1749.559959] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1749.560835] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1749.561699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1749.562563] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:53:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:53:08 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0x0, 0x2}, 0x10804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x800, 0x9, 0x67, 0x5, 0xb, "992c6846a492ffbd214ef12863338b1e463675"}) [ 1749.673662] FAULT_INJECTION: forcing a failure. [ 1749.673662] name failslab, interval 1, probability 0, space 0, times 0 [ 1749.675187] CPU: 0 PID: 10144 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1749.676035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1749.677064] Call Trace: [ 1749.677391] dump_stack+0x107/0x167 [ 1749.677837] should_fail.cold+0x5/0xa [ 1749.678304] ? ext4_find_extent+0xa77/0xd70 [ 1749.678837] should_failslab+0x5/0x20 [ 1749.679301] __kmalloc+0x72/0x390 [ 1749.679728] ext4_find_extent+0xa77/0xd70 [ 1749.680233] ? kfree+0xd7/0x340 [ 1749.680657] ext4_swap_extents+0x321/0x14c0 [ 1749.681185] ? ext4_ind_migrate+0x4d2/0x830 [ 1749.681721] ? ext4_get_es_cache+0x600/0x600 [ 1749.682271] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1749.682900] ext4_move_extents+0x2559/0x3050 [ 1749.683462] ? lock_acquire+0x197/0x470 [ 1749.683955] ? lock_acquire+0x197/0x470 [ 1749.684443] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1749.685094] ? lock_release+0x680/0x680 [ 1749.685601] __ext4_ioctl+0x302e/0x4190 [ 1749.686098] ? ext4_reset_inode_seed+0x450/0x450 [ 1749.686679] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1749.687322] ? find_held_lock+0x2c/0x110 [ 1749.687841] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1749.688554] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1749.689189] ? do_vfs_ioctl+0x283/0x10d0 [ 1749.689685] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1749.690326] ? generic_block_fiemap+0x60/0x60 [ 1749.690882] ? lock_downgrade+0x6d0/0x6d0 [ 1749.691393] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1749.691996] ? wait_for_completion_io+0x270/0x270 [ 1749.692602] ? selinux_file_ioctl+0xb6/0x270 [ 1749.693143] ? __ext4_ioctl+0x4190/0x4190 [ 1749.693653] __x64_sys_ioctl+0x19a/0x210 [ 1749.694153] do_syscall_64+0x33/0x40 [ 1749.694610] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1749.695239] RIP: 0033:0x7fb08f3deb19 [ 1749.695696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1749.697969] RSP: 002b:00007fb08c933188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1749.698901] RAX: ffffffffffffffda RBX: 00007fb08f4f2020 RCX: 00007fb08f3deb19 [ 1749.699772] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1749.700649] RBP: 00007fb08c9331d0 R08: 0000000000000000 R09: 0000000000000000 [ 1749.701527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1749.702397] R13: 00007ffe741e591f R14: 00007fb08c933300 R15: 0000000000022000 01:53:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x5c}, {0x6}]}, 0x10) 01:53:21 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="504da2e28c93b0fa41aaf08657f515c676f06e51633b785edd6f5818f05acf1cd22ca493459daa2a41318a1e13960bb3f8abe33472158f97f4a884b76114c074cde0faf35cc72a812a6aad5258296c180044ca78cc5d15b2bf6f5a0f0b9b2d1d4f8f06b8503f9eec986b724103a964d2688377aa904805088aa96b83b57f8ecca014a39b555d4dc6aaf49780cb1f46f83ed1ed57268d378433d394c2dee839cd88f378e41a0433201b84558a1873e5f7c4b4bacc62ab82dbcb3e67f60b95e3da67648cdd295216b40a264d9b365748f93544168b74ec865d8319401d86e2266e063abbcd7487d9dc7df7e59f509cf3f189cd6b6346c17dbedae299f94ac0", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, 0x0, 0x0, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:53:21 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)=[r0, r0]}, 0x2) r1 = pidfd_open(0xffffffffffffffff, 0x0) r2 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="db6c5b40eae14d98682c82766e733048befefcbaa42a211657d99b1dda3bcc5e468bede6bfa6b6651fd98fa14e1cd19641d7ba862b4a2641ffe9d9bce68c714a3ed7a0947c3ac7769c4e658847809680c3e299fc6de2e6fe04e66ee65b3509348c7212e3319cfc5fdec1debc7a74dda489d4931b2c52b2e10da680fb2da75b6d7922e9bc58156015b2ad7bf99b08bd9e7fc92fc5fb224c5277f1f2793e8068bcebe20d9ae8a321d05d06b086181f893a89fa3591a27b24e79ddfa74a706da3490f6fcf9671", 0xc5, 0x6ca318b8}], 0x800, &(0x7f0000000300)={[{@dots}, {@nodots}, {@fat=@check_strict}, {@dots}, {@fat=@nfs_nostale_ro}, {@fat=@umask={'umask', 0x3d, 0x8}}, {@dots}, {@fat=@dmask={'dmask', 0x3d, 0x77c}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}]}) dup3(r1, r2, 0x80000) syz_open_dev$ptys(0xc, 0x3, 0x1) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r3, 0x4, 0x42800) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r3, 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @local, 0xfff}, 0x1c) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x7ff, 0x3f, 0x68, 0x5, 0x7, "fd2c6846a492ffbd214ef1000002001e463675"}) 01:53:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 28) 01:53:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:53:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 43) 01:53:21 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a", 0x2}, {0x0}, {0x0}], 0x33}, 0x0, 0x4008000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x4007, @fd_index, 0x3f, &(0x7f0000000280)=[{&(0x7f00000003c0)="c03ba99e40da4d0e9bfe45d569fb10119003f482b1ab2f55bf6ee88f4cb08e8a384d91818860a8137ea054e2b6db80b74f36fc169cfd", 0x36}, {&(0x7f0000000940)="d343113475c495610ad16b6bcdb4f5e31f6d6dff2eb2cb4515baffad18c59e1b38f77cde8b9043a5a85cd4ca820f68d143f91a841d2baff5ae98d3755924a053a4c7f3d68d8023994b4f69b3e6ad1e75e34e188e19869bd23763b7d8dcb11d42d918ba8c72aa07daaf036ea6156011b808dee0563b1db97b70d9bfb05cd23c2e2a004fa604561fddf11cdd36aed9bf1c1ee10c0c48266d5ea6fe78caaf84f5383fc82caba738cf92b0ebd145fedfe46cfe8ea765afda79deb8cb4ad41e913a57f6593315a7219d4012af97bbf31077e42556723bf18ffe35d7fef4bd022a87e1124eeee8e1910bf1600b4f22543eeb82b817ed0a8985225debf4fa29bb129986a89e46d54d92bbfb6c0f022a5dbbf57c0f345cbe79dac30827a37b5c83e6b9ea7d399cd19df238d678e5db30b81707a8a7e6cdb0164b172ed5b0fdc082e3c491c3bf7f953db86e9c7d5cde36c336a09cf83ddc26fe413e8c76356a55977e02aa477c434ce33667d09be81a4f8280a73eb97c8c08a6aded8625d299f2369b1eaecc89c7bbc39582e5bc9e3f646f93a0a554775734492d7fe4db034ada603b1d43061b623638d46fc54a1c8203c799dcdfc5614ded57b97292896f3db2c1260f199c949dcf0b57d9265cc98a256da7e6151f95717478999b370f7d2fc1146aec229b12e02e0bcf739181e14e5bb943a6c0f93771d1aa442ec42bc1f65c7546b58ff441a73dfb99a06552757ada3b0ffa8005f6fe8f96893c5a3b475d10c65b01cae60a446e4e7dce45b9d2d2d01cf1ce48372ec7260aeb83ba5fd98defae596be95e836785ff4d472dcad32e8e9469a1e71625ac1996778f80a427e44ed79ed174e00a7251eb94a3495ee2a038098d612217b57c72ffae7c7d8b9a953215209bdf35365b1799e95396e2fa9d1b029f6d61a7e60de5e6728a307d8f1399880fe6456d484de4b46cc7ca3445b630877eb000911faa7cbdd3a6a62801f45fb4e4dcb6f880eec0975e932295f8165213d3df18f77cebd8ecc4d34aff1b79e7f7aad610166f3c75cb98768c54ecb3dd9ad4870b04a81e2855782e1990faabfedfae7be68825e218097ad6dfb0fd07f53c59b2b41e9ba65718747758309c4a986c7666f1d9380ba5b033ca4f09d30350213d402620594635fe4cb2a544ad90d5faa4d2e1972516a8b716dce4c5aefce22d99dc23014c8ef00b21aa3322c4fceaa12df049855dfbfaac5272fc90a6514109cd1be1a83cc8ec2bae9ccaecda3e231ec277df5cb4871a643785f46367cb4e4a1cc943c503e67163b0172946e0bb1fffc6303021277c4a9d550f078d5bc5d7cf29abdf82496f4c26f3f93d009f9a4eaf8a28f87dd56c8db224a4428f425177e05b2395328488946e84e5b9f42eeb4ded3181aba1be38ae6d6faa8fe83f80e87b974f2b876ea485a24a7d528f9ec71419b7188e2667df56fcc53e783613fe7398bc8e4148d5123ad27c0c604fedafc91b4b724f48bb6bb1aef19bd322bac1b840528b86864aac843f4b6bdacc399418bb0d60dc390187520571de348792084918a164cb1808f6c0ede6da08a6bc0a7128e228d065a98a8989ab86fca99d9f38fa9caef53f84ed9183e9acae44edb7179c0a9801ecedab1669faf4569dbfaa5b14ed0aae0d23da9105e8f1e4cef05679a8b50627c62d89e5bfabdee2fc756f4f89a0ad4755cd4012c12dd6b42e71aa9d75a19e8be9f59a5ae0ca3c5820a0d7a3db11ad40adf9486c3c2ea12fdd257566987c3b59cb8e9b217ec11bc7b4924aedec5a922991aea31e21f8a0281efcd908f861dcbc73d55358f16915b19746cf4f93cab8a9aed1e39c2aa36c667a2b73b358747286c13696a999659ea259653fc29cfb6369cb33935876813c9aee9ba2b9621662a2f6c3bf781db6d8bfc680172eed431965845729ddcb338a6e2e3291e8f89487ecf0fb20003ac3c58b05adb247cadb97466c0b00a2fe0104b799f4360bae618d872e4b2a9ec44d38b681483ed855dd31b95a3322a9631ba039032d94a5ffe7cea2d323cc92a8e2ccb793cad3841284d90774551e940769de00a7f960107d79e933a550c7ed65332a665b80b2b46a918247c8b1e1c5097d9429325ec3f66652f009f43513ada3c1230497a873bf8361bf015cb200ffd295ea62a86fb249b41d8bb4500ef8417431002d84e4d3a932a3405f06e221794beba7155131947edabbc2357f1a5e96c0cee5fba9cba2530e7b09a50a4aca042e7e1f93d145b22df31ea6042703e201c7211025da6f841d50b141e9109a4861c29b08675e8e9430e605d140cc64ae25a209acc1822ca529a586d5cfc20336f37d47241478b477cd923c2adf02d7bdae9499d526715bac765d3ae813d2dbcf69ea2f2705ef1660fae6b5b96abae285281a414f27cb0c76ad4663b3e7aacae4b97883ea73749e3bfc673b553eb0fedfa73f8e66879e46315bac2b6f29b792e24bd611e26e5312984fbe03926f3474c84bc0fed331e8ddb9d8e37001fd2dcfc6189595a6f1f5ed211c758989862ee697bfaab078e7d717be3bea6164e1819121b96f4ae62f9f2e81494ad12f2a54a13c02448843c7b528d56f8f88fc702fc7869bc562fec2201f323acf4ad4d533a66c48c64a46d3251b329f88864738b3cb2204f967492f21b3777c7f2d6eb4bf63f33acbd84c9fae2dde27fa9eae8011b000d9c80e7026ecf5dffd9d180c960558adcf591be97d7ab77613c9f6a5f613952f3430d034c4c214140e8cbfdcdfd69253ed1fc2efee8507454d3dff1b3ec2e3c0515ba5b07e595df56e41ce4fa4e3cbca1e7d3e0eef2026e505d8fe82c14ab1a1dda94445ff7bd451e0bc39b39d74e130a6980fc864b692ebed2cf0bceda2571d2b676037d75f7d82b9c0b213d421fa616ffb624c39bbc97234a04f91fddb4c7a9f2888b11fe138273cb5d4950932497e86ed99b141af52e2ecdacd18f8db3666467fd8b17626791f3bc27f92f1a542742a5ce967956b94dfb59b8f4b318734a53edeb1acee43d765e7bc133a9846ab0d9735f995cd14f45caa20c08c7597e0dd3e2572ed9ed142abb9e3bcd42e9a7047c1a8ae091af28e49ee79a6bd17e0d05ddc4e78afbbc22de56a326ffbcdfaf597f75541f50e33463165c0cea9ec791ff41588282a4d7d1a372b530f3fe7a27109625a076733abff869af5169e11a719be4866a15386a497f4774203de8499085f35767e6ab75b274aae1aa54d8679444b1ad6c015b77a178cd1a3e55b76d0277f386db78703e3d62ac91c739abd9f05b3daf2e5d5c1d7f7c5d96ff68e42fcbaf4ba2e8f0f4f661293d46724fd4c9b14955598d007045447a1a1f06d3c4c6ca4822744520a9953e05203acc37dc0c06c5b0abf03da5c838db0543e241579171ff34fee569884050113504920f4bc2967657ce21b2934fc963ea77b4feae116d4e321c7693aa3c7a6b23a41e02d03f5210b0c23a6712a3925c919384d7bf1be4d192326944cd5d6f5cc6df07aa8ae991dfa905e9f7016c2abc3b1932f8268506c59bfeed5c7d87b5b4231ca028f5198a24bd271cb2e53288bfc23b201aca46a54e91764501fcd3e1aabbd6ee8faf119c83c9006aa422ccb6f36d76ef6842418cc316bddc6af9abebf65c9d1be241e5a9079dbde1e35e060d9456b986b177d886a24311800d5f6e7bdfd9dd8f2b7d9f39d989dfe738e8b24b7f2500e1bc2722dccbb2e656034be973f35ce92ac5bdea38ad0e9877c2a6916d69912b6bf989fba22db566c0c3d9625f6c151a4d022f1c691be1cd8a07679bc2d3dc824de292606a8ee5315935dd887de8319759348c6187d1a62f978e0601de6e175bad3d1d3466a4b68f58a3cdcbe18da65a8847f0325638bf8d4d2838fac3cdd88802a12ef59a6b52f8af46d850b1f55e37120a419492dab7f32db73991a261426ee9f302ac1df63f3807be521e2727a76ca70198d74c8313790130be2fb2385dd2d69b5f5e7b1bf92d1fbb97573fdd5f6a518e3fd430ce2b99307142cb5f6ebb8d911a6c69064f3d3e24551e1e0e6743a81367dbf9747b28ad36b86798ddb343fa1b67650e153d30e1c692ae9b36f660cf55ca13cb678e791ee7a18afd62310d8b4ed232b0623c23da00e7f0e3f409fb586507c38a46efcce3c41cd158eebcf314732121facba4cecabe7efdd8c4f01a5ed222ac53b9bfe86231d98b12028807386b1e0b46b9ba45fb5041133406fea8e393893923fa1740b6bd0e7c0696e6d198abefe962218b37a4f6d568891c08d26a975e73c56bf23974bb329691b4ac6d1335c01baed2d4f72e96c7e3a3fcd6156071ca2264cccec879af2a51e46ac8bb3c34662d7da8eeb57ccdce8e2d8c7907558d5174f12e1421e3142127b2136af68262880336a9dcbd08e5be08f88f828b6ba68623e69db36659f11997a6cdd0a273c2edae814815e16daf239c5943999a2279ba890191ee3d9b95f96f659e946d5037a80b908e7e3c5589d15d76f3bede196d80c7ebc7ffea15cd6efdfe784ac37219ece05a2c99f14ce1137b5d28b89a723fe0b05bd44584b603a7313957fa010c0b0945892f6c963e657dc2ff055f71220e290843e3b842bdbe06d2809d982a04dd1d74eb41bf8e018a9670db62bbf11e9adafc428e1348b1ac5e612b5ce88b104d39cede54412392ba98cb0479e633b657b231a37088f49ebc9cc9b2121421c29d8efe9909834e112d6cf6337211134374349873b6686c0294f6c951eb55011a06ac471f6c811cc139ec71e9a771a2088ca42ca61161cfeab01f4fbb59c1e1755eb93231ecdceb7e084337bece653d49755bb4fb045b9ef2ae6d534e81917c60cdd908f41d9b1b4d572d509f42ee0ecede677c4c5eaa077cc6ccacacd5af4c6f33d9f9ce2b053e1e6adb7cfc65cbe2d6e9f5d664d55547280558ac59007ca2a5e994fed58905375b48b232682fb8c956c62ec4ad17988b8ddfe07b253012dab00430d97a70179253a5aeeac69a98e09f0ca0a7cbcb0e93422e6bef5f8865d0643fccc5c7f75cee07309a37362b77476d42f99d789e3ca3556c35aacd9c811eaed46308eb5db67454dfdfc0d0b0baf7b54bd6b2f8a04a39fb2f99738d1a43b9cf235d96ca0eee0d52d80d8fd55abdbf98687a71b3019605d803c08e26861484e7d8a8430f7b089066a2a3b33c817f22533f811dfef0a5468a986a37a27789a171afa2c96de9c9c85cb13c8adfc798e6f9c232ca37183f8e3f6e7eef640a39706156e19e26291bb2ed2adfb52c3f510af2f557c08771915f2f27f2724acd083fa5b488872e7ac6c2f65ba1a1efe2aaaf2c5062a690b3b6a0cd44a817d0fc9d18f0fec1bf432b53ee056f3d576ee40e3c4840cc1ca16a5a2d5fc293ad63115e0b0a7bfd0ac465bc5b846599b9180822e80054f0189a0d8c02e1ae61d38f203c7352669872bcd5247b18d33f34b02d0da31cc7eca6fc93a074225ba2506e68eabfd4d2c0b1f4a83e5bc4919074e6491b62549a2fa024dd57afa9b14938eccde5ddfcd22758c6042538b060ded5080cc9daecaa0a5bc3887f974cf37c65d550b331cfe22e1a17723ec673f78eadb9c39acd15a638167fc645dc6d537a9e6624d8a2eda6094236b82500b82bd06896d5ac41fd057387af97f8f672fc6a8b1eee20d669bc2789ad545d0f67726fb140bffa41b50179838b7a19b96153aef033816f0b6d056956b42bdf03f7faa5475acefb6be7687b1e1dfd22c0b4c20bda2d0e307d60223a9a47a6a878983b4f80032f0434e4f05251d029acd460dd11e2c984bac8d1a553c59", 0x1000}], 0x2, 0x0, 0x0, {0x2}}, 0x80000001) io_uring_enter(r1, 0x1b1, 0x1da1, 0x0, &(0x7f0000000040)={[0x2]}, 0x8) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x8, 0x1f, 0x1, 0x20, 0x0, 0x9, 0xac010, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xb9, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0x2, 0xffd, 0x0, 0x8, 0x7a7, 0x3, 0x0, 0x6, 0x0, 0x6d}, 0x0, 0x8, r0, 0xb) [ 1762.662750] FAULT_INJECTION: forcing a failure. [ 1762.662750] name failslab, interval 1, probability 0, space 0, times 0 [ 1762.664314] CPU: 1 PID: 10159 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1762.665223] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1762.666267] Call Trace: [ 1762.666600] dump_stack+0x107/0x167 [ 1762.667046] should_fail.cold+0x5/0xa [ 1762.667514] ? kvmalloc_node+0x119/0x170 [ 1762.668024] should_failslab+0x5/0x20 [ 1762.668488] __kmalloc_node+0x76/0x420 [ 1762.668963] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1762.669619] kvmalloc_node+0x119/0x170 [ 1762.670099] simple_xattr_alloc+0x43/0xa0 [ 1762.670607] simple_xattr_set+0x75/0x610 [ 1762.671110] kernfs_xattr_set+0x50/0x80 [ 1762.671601] selinux_kernfs_init_security+0x26d/0x4c0 [ 1762.672228] ? selinux_file_mprotect+0x610/0x610 [ 1762.672810] ? find_held_lock+0x2c/0x110 [ 1762.673506] ? __kernfs_new_node+0x2ad/0x860 [ 1762.674046] ? rwlock_bug.part.0+0x90/0x90 [ 1762.674565] security_kernfs_init_security+0x4e/0xb0 [ 1762.675189] __kernfs_new_node+0x531/0x860 [ 1762.675733] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1762.676339] ? cpumask_next+0x1f/0x30 01:53:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) [ 1762.676825] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1762.677468] ? pcpu_alloc+0x12a/0x1240 [ 1762.677948] kernfs_new_node+0x18d/0x250 [ 1762.678444] kernfs_create_dir_ns+0x49/0x160 [ 1762.678989] cgroup_mkdir+0x318/0xf50 [ 1762.679456] ? cgroup_destroy_locked+0x710/0x710 [ 1762.680030] kernfs_iop_mkdir+0x14d/0x1e0 [ 1762.680536] vfs_mkdir+0x493/0x750 [ 1762.680971] do_mkdirat+0x150/0x2b0 [ 1762.681488] ? user_path_create+0xf0/0xf0 [ 1762.682005] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1762.682644] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1762.683273] do_syscall_64+0x33/0x40 [ 1762.683727] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1762.684350] RIP: 0033:0x7f510ba9db19 [ 1762.684805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1762.687066] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1762.687991] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1762.688864] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1762.689794] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1762.690699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1762.691566] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 [ 1762.699364] FAULT_INJECTION: forcing a failure. [ 1762.699364] name failslab, interval 1, probability 0, space 0, times 0 [ 1762.700918] CPU: 0 PID: 10168 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1762.701805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1762.702812] Call Trace: [ 1762.703134] dump_stack+0x107/0x167 [ 1762.703581] should_fail.cold+0x5/0xa [ 1762.704053] ? create_object.isra.0+0x3a/0xa20 [ 1762.704614] should_failslab+0x5/0x20 [ 1762.709125] kmem_cache_alloc+0x5b/0x310 [ 1762.709643] create_object.isra.0+0x3a/0xa20 [ 1762.710192] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1762.710861] __kmalloc+0x16e/0x390 [ 1762.711324] ext4_find_extent+0xa77/0xd70 [ 1762.711871] ? kfree+0xd7/0x340 [ 1762.712317] ext4_swap_extents+0x321/0x14c0 [ 1762.712883] ? ext4_ind_migrate+0x4d2/0x830 [ 1762.713450] ? ext4_get_es_cache+0x600/0x600 [ 1762.714054] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1762.714725] ext4_move_extents+0x2559/0x3050 [ 1762.715328] ? lock_acquire+0x197/0x470 [ 1762.715852] ? lock_acquire+0x197/0x470 [ 1762.716382] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1762.717112] ? lock_release+0x680/0x680 [ 1762.717662] __ext4_ioctl+0x302e/0x4190 [ 1762.718211] ? ext4_reset_inode_seed+0x450/0x450 [ 1762.718845] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1762.719547] ? find_held_lock+0x2c/0x110 [ 1762.720105] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1762.720867] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1762.721572] ? do_vfs_ioctl+0x283/0x10d0 [ 1762.722106] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1762.722805] ? generic_block_fiemap+0x60/0x60 [ 1762.723391] ? lock_downgrade+0x6d0/0x6d0 [ 1762.723957] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1762.724576] ? wait_for_completion_io+0x270/0x270 [ 1762.725233] ? selinux_file_ioctl+0xb6/0x270 [ 1762.725814] ? __ext4_ioctl+0x4190/0x4190 [ 1762.726370] __x64_sys_ioctl+0x19a/0x210 [ 1762.726908] do_syscall_64+0x33/0x40 [ 1762.727402] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1762.728065] RIP: 0033:0x7fb08f3deb19 [ 1762.728568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1762.730978] RSP: 002b:00007fb08c933188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1762.731970] RAX: ffffffffffffffda RBX: 00007fb08f4f2020 RCX: 00007fb08f3deb19 [ 1762.732911] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1762.733868] RBP: 00007fb08c9331d0 R08: 0000000000000000 R09: 0000000000000000 [ 1762.734798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1762.735731] R13: 00007ffe741e591f R14: 00007fb08c933300 R15: 0000000000022000 [ 1762.898536] FAULT_INJECTION: forcing a failure. [ 1762.898536] name failslab, interval 1, probability 0, space 0, times 0 [ 1762.900030] CPU: 0 PID: 10181 Comm: syz-executor.5 Not tainted 5.10.227 #1 [ 1762.900931] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1762.902021] Call Trace: [ 1762.902373] dump_stack+0x107/0x167 [ 1762.902854] should_fail.cold+0x5/0xa [ 1762.903362] ? ext4_find_extent+0xa77/0xd70 [ 1762.903930] should_failslab+0x5/0x20 [ 1762.904439] __kmalloc+0x72/0x390 [ 1762.904899] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1762.905583] ext4_find_extent+0xa77/0xd70 [ 1762.906147] ext4_swap_extents+0x361/0x14c0 [ 1762.906717] ? ext4_ind_migrate+0x4d2/0x830 [ 1762.907300] ? ext4_get_es_cache+0x600/0x600 [ 1762.907886] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1762.908559] ext4_move_extents+0x2559/0x3050 [ 1762.909192] ? lock_acquire+0x197/0x470 [ 1762.909728] ? lock_acquire+0x197/0x470 [ 1762.910249] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1762.910932] ? lock_release+0x680/0x680 [ 1762.911482] __ext4_ioctl+0x302e/0x4190 [ 1762.912018] ? ext4_reset_inode_seed+0x450/0x450 [ 1762.912646] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1762.913356] ? find_held_lock+0x2c/0x110 [ 1762.913908] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1762.914654] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1762.915333] ? do_vfs_ioctl+0x283/0x10d0 [ 1762.915874] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1762.916562] ? generic_block_fiemap+0x60/0x60 [ 1762.917163] ? lock_downgrade+0x6d0/0x6d0 [ 1762.917711] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1762.918349] ? wait_for_completion_io+0x270/0x270 [ 1762.918989] ? selinux_file_ioctl+0xb6/0x270 [ 1762.919563] ? __ext4_ioctl+0x4190/0x4190 [ 1762.920113] __x64_sys_ioctl+0x19a/0x210 [ 1762.920647] do_syscall_64+0x33/0x40 [ 1762.921150] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1762.921819] RIP: 0033:0x7fb08f3deb19 [ 1762.922306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1762.924691] RSP: 002b:00007fb08c954188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1762.925703] RAX: ffffffffffffffda RBX: 00007fb08f4f1f60 RCX: 00007fb08f3deb19 [ 1762.926635] RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 [ 1762.927563] RBP: 00007fb08c9541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1762.928486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1762.929431] R13: 00007ffe741e591f R14: 00007fb08c954300 R15: 0000000000022000 [ 1762.947376] FAULT_INJECTION: forcing a failure. [ 1762.947376] name failslab, interval 1, probability 0, space 0, times 0 [ 1762.949054] CPU: 0 PID: 10183 Comm: syz-executor.4 Not tainted 5.10.227 #1 [ 1762.949953] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1762.951024] Call Trace: [ 1762.951372] dump_stack+0x107/0x167 [ 1762.951850] should_fail.cold+0x5/0xa [ 1762.952344] ? create_object.isra.0+0x3a/0xa20 [ 1762.952942] should_failslab+0x5/0x20 [ 1762.953427] kmem_cache_alloc+0x5b/0x310 [ 1762.953924] ? lock_downgrade+0x6d0/0x6d0 [ 1762.954434] create_object.isra.0+0x3a/0xa20 [ 1762.954963] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1762.955578] __kmalloc_node+0x1ae/0x420 [ 1762.956070] kvmalloc_node+0x119/0x170 [ 1762.956545] simple_xattr_alloc+0x43/0xa0 [ 1762.957063] simple_xattr_set+0x75/0x610 [ 1762.957565] kernfs_xattr_set+0x50/0x80 [ 1762.958055] selinux_kernfs_init_security+0x26d/0x4c0 [ 1762.958680] ? selinux_file_mprotect+0x610/0x610 [ 1762.959251] ? find_held_lock+0x2c/0x110 [ 1762.959747] ? __kernfs_new_node+0x2ad/0x860 [ 1762.960287] ? rwlock_bug.part.0+0x90/0x90 [ 1762.960804] security_kernfs_init_security+0x4e/0xb0 [ 1762.961435] __kernfs_new_node+0x531/0x860 [ 1762.961952] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1762.962528] ? cpumask_next+0x1f/0x30 [ 1762.962993] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1762.963555] ? pcpu_alloc+0x12a/0x1240 [ 1762.964032] kernfs_new_node+0x18d/0x250 [ 1762.964527] kernfs_create_dir_ns+0x49/0x160 [ 1762.965079] cgroup_mkdir+0x318/0xf50 [ 1762.965546] ? cgroup_destroy_locked+0x710/0x710 [ 1762.966122] kernfs_iop_mkdir+0x14d/0x1e0 [ 1762.966626] vfs_mkdir+0x493/0x750 [ 1762.967063] do_mkdirat+0x150/0x2b0 [ 1762.967517] ? user_path_create+0xf0/0xf0 [ 1762.968024] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1762.968662] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1762.969316] do_syscall_64+0x33/0x40 [ 1762.969772] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1762.970392] RIP: 0033:0x7f510ba9db19 [ 1762.970847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1762.973076] RSP: 002b:00007f5109013188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1762.974003] RAX: ffffffffffffffda RBX: 00007f510bbb0f60 RCX: 00007f510ba9db19 [ 1762.974866] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000006 [ 1762.975725] RBP: 00007f51090131d0 R08: 0000000000000000 R09: 0000000000000000 [ 1762.976588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1762.977460] R13: 00007ffe3918a5bf R14: 00007f5109013300 R15: 0000000000022000 01:53:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x60}, {0x6}]}, 0x10) 01:53:21 executing program 7: r0 = add_key$fscrypt_provisioning(&(0x7f00000008c0), &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000940)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, 0xfffffffffffffffb) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000540), 0x40040, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x9, 0x26, 0x7f, 0x1, 0x0, 0x80000000, 0x800, 0x11, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x1, 0x2700}, 0x1, 0x7, 0x4, 0x3, 0x0, 0x3, 0x400, 0x0, 0x9, 0x0, 0x1e}, 0x0, 0x10, 0xffffffffffffffff, 0x1) writev(r3, &(0x7f0000000480)=[{&(0x7f0000000140)="97dbd2d5bf7624b9ebea9b240d833f462a278ad034dc14e0ed2225a8ec4652f34751a7e2486038a1da18e2435d15ecedd270edf3b34ce22f03282286ddb837bbf96880adfade5d6527ebe7ec6ff90d01b3a01b3409ec819b1a98946d79ded1e028bfdd52ed3fcbc4489fc0f7905b414ae92015a4a3485a5a62faaab09408f8472f224be888f581811f0422f397150f3abf19c81799b2af787cf48f8589226767d9881dd7843f15db4fb9dabd219cf78a5ebbe7e4807c3fe9e2c2ddb3f47d061b371267663e31c782455acd7c7c4784f986584ba9c8a179f9a28b7b36992cf22893", 0xe1}, {&(0x7f0000000240)="26382f27d340ee6302be7877fb8621663a4e60c03132fd647e3c7480692cdc38283624cafdbcdfd10cf7a3fea3126f0b49885dab88106cc8b45f789b5b4bef5791fddcb6ccaaabbd2c8b3fa36cdb700a38bea936d3958a33834ade83e600dfa606f6851e2de2523fe3e3e3b74de446a9384b9dc589dd863be3f72537d1e0aad632920009a4e8490e61279a35a14b6286266f4054063ee0044d3c55f8b1b18a3b45d262a9c0024bf19d1129c0325fe262cf50ce07e1c5f38580d4e716598640ce9a31e5d9268d386421ddd81561fad860436bc7d6e0ccd5585be2b28483d60c7d5dcd38b99865af893e", 0xe9}, {&(0x7f0000000080)="aac785fcd20da455ab9dea26ed363d6dfda2cfb106c92b7a0ee89535e215246dab83eb3e2da481387b784200200221fecd3d8b79be86527c5274b9d7218a04", 0x3f}, {&(0x7f0000000bc0)="5fb7a0813c344466a054a9a62587f3c2daf8aadd9f016c3f754c729f56a807f275c5d0def598026d8d2a5c3dbc6637083ac0c96ee6a6f6679b78029f85162e29907a925b0389f4ee5f56ebee8397d26ca26e07c57b921fb906205c0588af250294bf223d4f4a3d83654f495513a50bcae7435b8043a0caffe61fa00413987224d8eb13e7e7d56b31d1bb24d4973cc7b707700414cdb42e2c2583babb25d4212df5c1a00dc484b1a3df981c4c6e769960c4b6ebdfde2cdb72637296093c0da42d6713af63367274e31fffe174", 0xcc}, {&(0x7f00000003c0)="dfb34673ee2cca913654b41ae286482eabe75f111a6de9823e193a2a27699fa43d87280265d2e38829aad5cc2329b30cdc402db5f5f3c8b1637e8dd69bb674ba4aba1ccdff72bbfab243f3be01d53f4dc59f0f301076a1c365b39c2d9ba5997aafc6b7279ab3431644913709b961f5b00ef1548fc456ce91813cfd70fc86c6b96863b542a86e9e6d1f57497dfef5c85b6f7e4280d0f25635639d188c80b9b5220cf5fe6f343f3028ae5427a63ccbb9c5", 0xb0}], 0x5) r4 = openat$cgroup_type(r2, &(0x7f0000000980), 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f00000009c0)={0x0, 0x5e30, 0xf259}) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r6, 0x4, 0x42800) socket$inet6_udplite(0xa, 0x2, 0x88) r7 = syz_open_dev$vcsa(&(0x7f0000000640), 0x18, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, &(0x7f0000000680)={{0x1, 0x1, 0x18, r5, {0x18000000}}, './file0\x00'}) add_key$keyring(&(0x7f0000000100), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r5, 0x5000943a, &(0x7f0000001e00)={{}, 0x0, 0xe, @unused=[0x9, 0x7, 0x400, 0x590], @devid}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600), 0x300b800, &(0x7f0000000a00)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB=',privport,noextend,cache=loose,dfltgid=', @ANYRESHEX=r9, @ANYBLOB=',afid=0x0000000000000004,noextend,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',posixacl,noextend,mask=^MAY_WRITE,dont_measure,euid<', @ANYRESDEC, @ANYBLOB="2c6f626a5f757365723d2f6465762f66756c6c002c7365636c6162656c2c006cb55112e103e654cf025586aa1e157e6eb0ed5f3f3ccdd9fdac899d66849686cbcf92c339e2ca26db8f5faac8e24710fb87967281bfb643ca7bf73bb8ebee1941c4e442c8f4212ece2feb1f73f401a739e83cda6eda1ae2193ac2a629c7a16d0e8db880df4caf4499b1cca9405ea47e9202ec0f74d13a001d64b2175d25130000000000"]) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f00000000c0), &(0x7f0000000500)=0x4) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000580)=""/47) 01:53:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 29) 01:53:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) (fail_nth: 44) 01:53:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x8}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) fallocate(r3, 0x0, 0x0, 0xfdef) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 01:53:21 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) r1 = eventfd2(0x80, 0x80001) fcntl$notify(r1, 0x402, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x1004}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c808) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = syz_open_procfs(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x5, &(0x7f0000000700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000300)="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", 0xfe, 0xbee8, 0x0, 0x2, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000400)="7cb26ecd3f4af71750d3e68167660c25f9f6575142d7a9873993ccfb636e5b92851942f5bd18934c57ea4e66af5f6bc091278e71d7b2f68755acb206cec59d62cc94a96f125c1cd6fe7ad91bfa383db6669d9ea8aa14692b71f6a702eb4ce94dde5e28f5e4a847ddfe1f78544d408a59c34479cccf612939e1a52d5e3175fd65b644bd", 0x83, 0x1e7, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f00000004c0)="937ae5721e82bd64910857e464cfbb42c967eef0d401793bdce40b79bc00ac8671a804c0847d8eed9b3235934cb1d60d41eb4a33db3b12642402490e622f192a872e3f3171d454f174955731319ca4277d72494764f3b5731418604dcfe97daf47579e1f78a7e43037dccc3902dd32324f8d346679fc7d9403598aadf21c45a107e265ef3239e0241b5e5c910a514b0a83d3d0e9b7f96d35e225ba682013", 0x9e, 0x1f, 0x0, 0x3, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r5, &(0x7f00000005c0)="bea7367e870e22c77243c8509849ba3e8aada50245d6b909a992c1624856af92d125e09f8ba6a5921479cbc3d0772a3624aaf876ffad0b4c852f9441a81dad957c5291230dea09d94e3376554dd7ab5f", 0x50, 0x10000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000680), 0x0, 0x1000, 0x0, 0x4}]) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, r7, 0xb99771294b5ad721}, 0x14}}, 0x0) close_range(r5, r6, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 01:53:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x1a0cc84, &(0x7f00000004c0)=ANY=[]) open(&(0x7f0000000280)='./file0\x00', 0x490002, 0x0) 01:53:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x61}, {0x6}]}, 0x10) [ 1775.472622] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888016d80680 (size 144): comm "syz-executor.4", pid 10159, jiffies 4296429659 (age 19.963s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 91 a8 19 67 00 00 00 00 ...........g.... 98 6f 9c 0b 00 00 00 00 91 a8 19 67 00 00 00 00 .o.........g.... backtrace: [<0000000026de77a9>] __kernfs_iattrs+0xbc/0x470 [<0000000076c5353b>] kernfs_xattr_set+0x2b/0x80 [<000000003417de1b>] selinux_kernfs_init_security+0x26d/0x4c0 [<00000000530a2469>] security_kernfs_init_security+0x4e/0xb0 [<00000000e860b07d>] __kernfs_new_node+0x531/0x860 [<0000000066c602eb>] kernfs_new_node+0x18d/0x250 [<00000000df8e3f59>] kernfs_create_dir_ns+0x49/0x160 [<00000000f8966a8d>] cgroup_mkdir+0x318/0xf50 [<00000000962125c0>] kernfs_iop_mkdir+0x14d/0x1e0 [<00000000c4f5fa3a>] vfs_mkdir+0x493/0x750 [<0000000034ef6c42>] do_mkdirat+0x150/0x2b0 [<000000000bf39d15>] do_syscall_64+0x33/0x40 [<000000006835f5e9>] entry_SYSCALL_64_after_hwframe+0x67/0xd1 BUG: leak checking failed VM DIAGNOSIS: 01:53:41 Registers: info registers vcpu 0 RAX=0000000080010001 RBX=0000000000000000 RCX=ffffffff814fc62d RDX=ffffffff84e32280 RSI=ffffffff814fcee9 RDI=0000000000000005 RBP=ffff88806ce09d98 RSP=ffff88806ce09ce8 R8 =0000000000000000 R9 =ffff88806ce3b2c3 R10=0000000000000000 R11=0000000000000001 R12=ffff88806ce3b2c0 R13=0000000000000000 R14=ffffffff84e32280 R15=ffff88806ce3b2d8 RIP=ffffffff8140bdbd RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffeda5a57e0 CR3=0000000004e26000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=0000000000000000000000000000ff00 XMM01=25252525252525252525252525252525 XMM02=646970202c22342e726f747563657865 XMM03=00000000000000000000000000000000 XMM04=0000000000000000000000000000ff00 XMM05=36313038383866666666783020746365 XMM06=34343120657a69732820303836303864 XMM07=652d7a797322206d6d6f6320200a3a29 XMM08=0a316478302f373678302b656d617266 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e7b900 RBX=0000000000000001 RCX=ffffffff83e634dc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7bf08 RBP=ffffed100112f000 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85677688 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7b90e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe6300000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f9536869f08 CR3=000000000e07c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000418a8a0000000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000