0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0xc00e000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x419e9, 0x10, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:20:28 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x1b0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0xf00000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:20:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x9effffff}, 0x14}}, 0x0) 08:20:28 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0xf0ffffff00000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:28 executing program 4: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0xf000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:28 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4589, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:20:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0xf0ffffff}, 0x14}}, 0x0) 08:20:28 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) futimesat(0xffffffffffffff9c, &(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000440)={{0x77359400}}) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0xbcc, 0x3) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000ebd2b5e96e573818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc9988988d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998e", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0xd9) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0x8c) 08:20:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x4000000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:20:42 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') recvmmsg(r2, &(0x7f0000008380)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000500)=""/205, 0xcd}, {&(0x7f0000000880)=""/252, 0xfc}, {&(0x7f0000000980)=""/217, 0xd9}, {&(0x7f0000000240)=""/18, 0x12}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f0000000a80)=""/251, 0xfb}, {&(0x7f0000000600)=""/89, 0x59}, {&(0x7f0000000b80)=""/4096, 0x1000}], 0x8, &(0x7f0000001c00)=""/173, 0xad}, 0x8}, {{&(0x7f0000001cc0)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/136, 0x88}], 0x2, &(0x7f0000002ec0)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000003ec0)=@isdn, 0x80, &(0x7f00000042c0)=[{&(0x7f0000001d40)=""/51, 0x33}, {&(0x7f0000003f40)=""/203, 0xcb}, {&(0x7f0000004040)=""/207, 0xcf}, {&(0x7f0000004140)=""/174, 0xae}, {&(0x7f0000004200)=""/139, 0x8b}], 0x5}, 0x1ff}, {{&(0x7f0000004340)=@tipc=@id, 0x80, &(0x7f00000055c0)=[{&(0x7f00000043c0)=""/209, 0xd1}, {&(0x7f00000044c0)=""/48, 0x30}, {&(0x7f0000004500)=""/37, 0x25}, {&(0x7f0000004540)=""/128, 0x80}, {&(0x7f00000045c0)=""/4096, 0x1000}], 0x5, &(0x7f0000005640)=""/4096, 0x1000}, 0x80}, {{&(0x7f0000006640)=@generic, 0x80, &(0x7f0000006880)=[{&(0x7f00000066c0)=""/94, 0x5e}, {&(0x7f0000006740)=""/241, 0xf1}, {&(0x7f0000006840)=""/10, 0xa}], 0x3, &(0x7f00000068c0)=""/3, 0x3}, 0xfff}, {{&(0x7f0000006900)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000006980)=""/154, 0x9a}, {&(0x7f0000006a40)=""/242, 0xf2}, {&(0x7f0000006b40)=""/4096, 0x1000}, {&(0x7f0000007b40)=""/14, 0xe}, {&(0x7f0000007b80)=""/141, 0x8d}, {&(0x7f0000007c40)=""/233, 0xe9}, {&(0x7f0000007d40)=""/74, 0x4a}], 0x7, &(0x7f0000007e40)=""/75, 0x4b}, 0x3304dab}, {{0x0, 0x0, &(0x7f0000008000)=[{&(0x7f0000007ec0)=""/52, 0x34}, {&(0x7f0000007f00)=""/33, 0x21}, {&(0x7f0000007f40)=""/145, 0x91}], 0x3}, 0x8}, {{&(0x7f0000008040)=@ax25={{}, [@null, @default, @bcast, @netrom, @rose, @bcast, @default]}, 0x80, &(0x7f00000082c0)=[{&(0x7f00000080c0)=""/93, 0x5d}, {&(0x7f0000008140)=""/159, 0x9f}, {&(0x7f0000008200)=""/173, 0xad}], 0x3, &(0x7f0000008300)=""/121, 0x79}, 0x5}], 0x8, 0x40, &(0x7f0000008580)) syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="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"]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:20:42 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857c61f87b35b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0271a5f3255c413bef782b83a9e3809c22f5c5fecf0d9a2d93650da3404db6add78bb66a44658a882d4f5a5039e01655a43b760f383f75083e3a622f0db624baf2fde2b63aa5a4c59632ee763fd3e4d0445a0d253238686be6f1b9bc6e90a5af85d3c00001bac99742bd0b935f84281bbbaa6ed91e3b0e8d30c8722ed12240000000000000000000000ce9693ad519d63f07151d9559009c8e79db70c41868a7ff8e727e7e5abe0b70ab800af237e710a83a754f6a79fd0b6a012dd008dbb2e71310072a77a36041f2c7974cbefe071f5f127eb3974bc6451acc14813d3f082091e47409b17748540308242d9340e66424322cf02ef532a4fd21d7d8a8bf0037bd70b446481cba738ed122cea87", @ANYRES32, @ANYBLOB="6500000000000000000000000900cbe75ee4157a2aaeea9c"]) r2 = open(&(0x7f0000000440)='./file0\x00', 0x240880, 0x54) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:20:42 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)) 08:20:42 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x300}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0xfffff000}, 0x14}}, 0x0) 08:20:42 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:20:42 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0xffffff7f00000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x8100000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 2768.494499] cgroup2: Unknown parameter '>3vܙ)lo4Y٦TV'_2U:8 /\_٢6P4jxfFXeZC`P"bK/+cZLYc.c>MES#o [ 2768.494499] Z]<' 08:20:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0xffffff7f}, 0x14}}, 0x0) 08:20:42 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0xfffffffffffff000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:42 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xec0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:42 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000003, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19eb, 0x14, 0x80000}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) chmod(&(0x7f0000000240)='./file0/file1\x00', 0x10) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:20:56 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000003, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19eb, 0x14, 0x80000}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) chmod(&(0x7f0000000240)='./file0/file1\x00', 0x10) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:20:56 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf00}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:56 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000240)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1e, 0x6345d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) lgetxattr(&(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000440)=@random={'osx.', '\x00'}, &(0x7f0000000580)=""/93, 0x5d) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:20:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x9effffff00000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:20:56 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:20:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0xffffff9e}, 0x14}}, 0x0) 08:20:56 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x2}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:56 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') move_mount(r0, &(0x7f0000000240)='./file1\x00', r2, &(0x7f0000000440)='./file0/file1\x00', 0x5e) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:20:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0xfffffff0}, 0x14}}, 0x0) 08:20:56 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000440)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000440)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:20:56 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x3}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0xa701000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:20:56 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x4000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:20:56 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x44, 0x0, 0x1917065, &(0x7f0000000580)=ANY=[@ANYRESOCT=r0, @ANYBLOB="30f6c7ec931e2822ddb0616a12289c3007d47be81d2f439366edfff3551d4847bbf282da8c651b9fda87c74d19f8a2b38e8ca42b6e9df53d355b4a53d42613965a0ea15e6eb4d753a91b8ad4b8085c8e1d1e9402b2ab53eabdcd20f623a5083d158b64e68c8194b0c44b54db91aae9eed85d783328235722d38a547dc33d", @ANYRESDEC=r0]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f0000000440)='./file0/file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:20:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0xffffffff}, 0x14}}, 0x0) 08:21:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}}, 0x0) 08:21:12 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r3 = syz_io_uring_setup(0x4147, &(0x7f0000000440)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0}, 0x280, 0x9, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb8988f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0ed14c032154481c13b92cd6fa09743945c5f2601f1734cf83d30f1c010b469f997ad1f012854ea095bb7ff5a66a35e6b4135dde4e697ebbb53b706a579a6fefea2b3", @ANYRES32, @ANYBLOB="69230000891292978c83c5a7"]) fallocate(r3, 0x40, 0x9b05, 0x5) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:12 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e33cd1b0929c1af5bb3f3a6bc6ea0bd55ac4a4f21c876dc998d9da0f929116c6fa19c341995a6b71384017f1f", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:21:12 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x8100}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0xc00e000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:21:12 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) r2 = getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x5e, 0x21591, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x8}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:21:12 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x4}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:12 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r2, &(0x7f0000000440)='./file0/file1\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)=ANY=[@ANYBLOB="00000000000000000000eb3818e6146793e0ec4c261a779b23cdfedb89c8f26190f373300f35156c99ac8dbeaef5516bf85cb2bbd5be81343e33eb51e694393f0276dc998d9da4f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0006d030800000000a414e3098c878f5fc6e72919ac19439e9da149e798c46d914b8266e26e94f713dc4e80715a834971699c70a563c07fc16059e43f63155f6e1ae1a092fcd29f06ce9b78e282447d0fd030b23fed260a8eb65b64bb4757737ead7501b7cf31c92b64cede903c2ccef32186", @ANYRES32, @ANYBLOB='e\x00'/14]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:21:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x2}, 0x14}}, 0x0) 08:21:12 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f0000000480)='./file0/file1\x00', 0x180) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:12 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xb001}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:12 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x8}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0xf0ffffff00000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:21:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x8}, 0x14}}, 0x0) 08:21:25 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r2 = syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) openat(r1, &(0x7f0000000240)='./file1\x00', 0x202c0, 0x46) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="00b68f0890b3272ba1b40530b9483c831354e5193959f603000000000000005f2a4d52332db819c6b879573a0b9013d966395ad91a52662b58195f9cc7c37f8ed15bfabd4222dd98b14fc0365015b9b55dc8ea6881d11b5e6299921bc24e2188274f8c"]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240980, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) dup2(r2, r0) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:25 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:25 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') llistxattr(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000500)=""/132, 0x84) syz_io_uring_setup(0x1004147, &(0x7f00000003c0)={0x0, 0x19e7, 0x4, 0x3, 0x219}, &(0x7f0000003000/0x3000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="6500000000000000000000000000ae3ecf7f0a32430168cc4c60f8b334b14cd82a8a7a8341a45e45bd6e9e6ac90fe292cbfc9c520e171e1dcf09f66e5949ec9558119c51530305a65fc30e66052f8199e879545ed199958df08fc98c83e5ab1948d6b93e601872bfb05eedf18d1dff00000000000000eb73e74e0c7c2ba9ab58b801192041be96ead82036"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000440), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:25 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xc00e}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:25 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f0000000440)={0x0, 0x19e9, 0x4, 0x80003}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x68880, 0xaf) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0xffffff7f00000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:21:25 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='udf\x00', 0x400, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:21:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xf}, 0x14}}, 0x0) 08:21:25 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0xfffffffffffff000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:21:25 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:25 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') sendmsg$sock(r2, &(0x7f0000000900)={&(0x7f0000000440)=@llc={0x1a, 0x325, 0xf7, 0xf6, 0x5, 0x1}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=[@mark={{0x14, 0x1, 0x24, 0xff}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0x401}}], 0x90}, 0x4004001) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 2811.596467] cgroup2: Unknown parameter '@' 08:21:38 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe000000000000000000000000000006eecec982c90eda6160606f45883dc12c92e66353c534a9c33920772b3239a999682f61b7b6da1990aa7c95c4cd0236a2dffc68e1c441776f1aef4e6656dacd24efbe6bb7621db02c596f4af4be26d724247fb9c894662319c44076fa9684ff32bde9d5cddfa2beab0a35def0ed96cc2577945cb2a95", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:38 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x8cc80, 0x14a) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:21:38 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x1a0}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:38 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x34000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:38 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:38 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="01040000000000000000000000008eb1de59dc09a52c2e09c38060c6532caaa6e758ae296fb4c3ff02954eb4063dfa99bb008ff7c90eacfe2b7ceed039e18e377d7f52d4c3a790b2cc25f13c1872d61d9f3b9accc58221733cf7333d0f57bcac"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:38 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x2}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:21:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xf0}, 0x14}}, 0x0) 08:21:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x29a}, 0x14}}, 0x0) 08:21:38 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x3}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:21:38 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x80000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:38 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x300}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:38 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:38 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff6700a3d9dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd59f547857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="6500000000000000000000000000b229c3773930cf8da20a445f4a41f2d65a636a83a9ef94c3f22e5638c0a7fc07ab301d95976b3fc481fc55b953b531e874ba3bec9c0915d13855f29339c6d022723b10edbd03a0a0530577d9f9687fc4e84028561344a57d46cc6bb98df1b5569f493cafc2d35c9af3464591d0a38163992bb9559041e202987b70919a32d2e397a97e353d985e"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) r3 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x6, r3) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r1 = openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8891, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYRES64, @ANYRES32, @ANYRES32]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) r3 = syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000001c0)='./file0/file1/file0\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x100000000) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) mkdirat(r3, &(0x7f0000000240)='./file0\x00', 0x8) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:38 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85c97bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b7138401471f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:21:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xf00}, 0x14}}, 0x0) 08:21:38 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x4}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:21:54 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x400300}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:54 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000500)='./file0/file1\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="86dada24bdd8624714170d0b599d0800000000000000"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f0000000100)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:21:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x8}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:21:54 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4}, &(0x7f0000004000/0x2000)=nil, &(0x7f0000004000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="65000600000000"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) r3 = creat(&(0x7f0000000580)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x8, 0x804e0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x289, 0x4, @perf_bp={&(0x7f0000000240), 0xe}, 0x10100, 0x0, 0x8, 0x6, 0x3, 0x81, 0x1f, 0x0, 0xa7, 0x0, 0x2688}, 0x0, 0x2, r3, 0x1) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:54 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xec0}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:54 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x8100}, 0x14}}, 0x0) 08:21:54 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000018c0)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="6500000000000000000000000000e6b1e79d6b052dc7f6f3d9aaec876da2e2b80cebf06cd03adc08b34562c83c65b837c86bd448d1f1b7728b4d697c55a23226ae470b4e70bec8e651351de00b5180dc8a2dd758e324ffcf59f3c2de82e84842b260ebe429b6d88b8011013d3ee0d924a0b512f178884fe6cec69d4d0d65fbdda2d8c594c69998940d297e4ff10b6fcc70a08b23e6ff4ec01facb4badfd27e3ad6468bbb1e2a081e25e8e0d04bb1753ec5e5ba4fe4ba80e064d699667b032d95c7e9817189c6ead198d62b1729a1e9e2fac95852ce317ffe04527f2215554a8ebbb417c63105d3fba703b8b0bd3a53c291094626be3341433ea60c53707fed67d1548b737dd30f115044f1206d21e922b51848d6fa4a8b8cd0c6903f96dba79ef7e947e06d05738d01c9d61ff2ff440031f7eb0a00deb2df2bcf47ab292afbce53b1fcb8f8bd8e98c7f2c389da2c94d1ab58c2c0c90c45a5b57e172344b3266569df3cddecbe4a7938e8807013107251b5162e10cc0fc620b54f5a4ecd9473edd5863628825492691343ff32b61980750c7aae4041ba27c88fc22785ec97cba9fe2cd437b979fe4ce0ff1f1eb941ace678429b8519a7bd79b8f489502a74da0391afdfd6c1a42aa79b0216761b033309f9adfeb4c1ba87311b3758525f16a8cef5f38199e06fc251f5b87c2583e644d18a7f7541c405bc91591453f3fb73793e485419c51c93129c963025c47768fd0c76fc830ee7b8175387956ef8094ae64efe46f782ce11b3864a57f24bc187da69478d8950818c82ba05512d07506e240d1a0ab8225cf0efe74dbb0f224d1a7139c3fc8ba7d71aff3e58f1eabc5cb2920aaa5d3412726dac72f1ce303b93084b9848c8dc2b1bb414f033b576d9afb66e4ef67ca05798116cc1e69b3710c98f08ade5708da30228db2a5167d4fa8cc68c56396d18120aec8f928078"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000580)="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", 0xfd}, {&(0x7f00000008c0)="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", 0x1000}], 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 2839.936599] cgroup2: Unknown parameter '({#{/·|q$*q-Vi@U3㐪"f۶[<}`cder%b.2$_V' 08:21:54 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf00}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:54 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffff}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:21:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:21:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x9a02}, 0x14}}, 0x0) 08:21:54 executing program 4: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:21:54 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000480)='./file0/file1\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000440)='./file0\x00', 0xa6) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:21:54 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x200000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe098a55e2702b98b9f2fbb7feac652673b3a2b98350207db5717c7c1e7688d8c81af8739f1413397239f9a4362e17300799a38229bc1084850c7eb13313194e3a53c7e3db80b78e177dd993f71355b83976f3ac4267f859cf5301131c994d9f54276eae0ae9e04bf638101bd9ba38026ae60df7dd740b612dc41d8200c7589391d30c6f5862191d69ba0a18106769fa09b4d60", @ANYRES32, @ANYRESHEX=r3]) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(r2, &(0x7f0000000880)='./file0/file1\x00', 0x4182, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:54 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x10c062, &(0x7f0000000500)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x1, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x6000, @fd, 0x5, 0x2b9855e7, 0x0, 0x6, 0x0, {0x2}}, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="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"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:21:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xf000}, 0x14}}, 0x0) 08:22:06 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) mkdirat(0xffffffffffffffff, &(0x7f0000000440)='./file0/file1\x00', 0x0) 08:22:06 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x4000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:06 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x14e0, &(0x7f00000003c0)={0x0, 0xbd87, 0x4, 0x1, 0x3ab}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dacee22ef5cdfedb89c8f261900c73300f36156c99ac7857ad3ac4dccc6c008b69625b81343e337601000000000000006c6fa19c341995a6b71384017f1f5918d9bd8d5482008e7779fea3688d3f83c18852", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:22:06 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x1000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:06 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:22:06 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') setresuid(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000500)='./file0\x00', 0xfe, 0x3, &(0x7f0000000780)=[{&(0x7f0000000540)="2d958de7691ac956c18597f9e89455db693a0bb183041488c150e8225258bac33478b668e59dc31fa50f4465a674919805a6b256738304b0deb8480824d45823458f80248f0fdde2e49c3eb8147dba2e3b8847b2b017dfee874bd99d86f130fe1bd2468cdf4a61c554ee4a310b1eff716fc5e41412", 0x75, 0x8}, {&(0x7f00000005c0)="c41ce28ad8c3e3308aa2786a14911a88c536a9bfca08b22bb5d7b472e7b8c2f050f5a888cac9a61b2cd7b1c4a008989cc2d64824afd06617c4185c40fee9a377ec3250eec790424791966edfe07e648acd7a78c69f1c01cb473784d66bd26fd47566f1cc1ff501c80d46adcedaacfc276626d482a6681c230bd874c50dac66a899ab89173c2fda50caafc4d84a955428f2d25567039be6372da1d7ea46fa29271ee4e6dc9269ae526d39b9ecc24178398666899152b44a", 0xb7, 0x9}, {&(0x7f0000000680)="9cca3bae2aa41d10278122b831cde10ce95003225fe8c0dd49f123a6214ff1bec3273473dd29dae4f82da57e20f3fad8cb34e65a962aab54c86d457af885b69c8e54091fa09ca32e04189aad2356b1f378a53d42ee146c8d97bd0b7ce51a5faccc88ee54a9170aa5b8c5842d1830471bff79c094916b8f9a8619ba56bed7a0be24a811d363a615961b8763f48cddad8ea0b951741135e9d39de8b6527867a230edf3da68a6ddacadb70e8a3392f9bb5c7b5b9c0e8194791fa7e9d42f08df607aede30cb18ed067175789c29ed11abb2ea0736d0565f8773aec53370110aae3bcbd43e4b102f34c2f1b5e14c06b49a22f4fa44936", 0xf4, 0x6}], 0x40800, &(0x7f0000000800)={[{@huge_advise}, {@mode={'mode', 0x3d, 0xffffffff}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@huge_advise}, {@mode={'mode', 0x3d, 0x3}}, {@huge_advise}, {@mode={'mode', 0x3d, 0xae4}}, {@size={'size', 0x3d, [0x6d]}}, {@gid}], [{@uid_lt}, {@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, '&'}}]}) syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67f90c0000f5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe00144d128", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:22:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x34000}, 0x14}}, 0x0) 08:22:06 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) mkdirat(r2, &(0x7f0000000240)='./file0/../file0\x00', 0xd2) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:22:06 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x1a7}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:22:06 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x80000}, 0x14}}, 0x0) 08:22:06 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80580, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:22:06 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') setresuid(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000500)='./file0\x00', 0xfe, 0x3, &(0x7f0000000780)=[{&(0x7f0000000540)="2d958de7691ac956c18597f9e89455db693a0bb183041488c150e8225258bac33478b668e59dc31fa50f4465a674919805a6b256738304b0deb8480824d45823458f80248f0fdde2e49c3eb8147dba2e3b8847b2b017dfee874bd99d86f130fe1bd2468cdf4a61c554ee4a310b1eff716fc5e41412", 0x75, 0x8}, {&(0x7f00000005c0)="c41ce28ad8c3e3308aa2786a14911a88c536a9bfca08b22bb5d7b472e7b8c2f050f5a888cac9a61b2cd7b1c4a008989cc2d64824afd06617c4185c40fee9a377ec3250eec790424791966edfe07e648acd7a78c69f1c01cb473784d66bd26fd47566f1cc1ff501c80d46adcedaacfc276626d482a6681c230bd874c50dac66a899ab89173c2fda50caafc4d84a955428f2d25567039be6372da1d7ea46fa29271ee4e6dc9269ae526d39b9ecc24178398666899152b44a", 0xb7, 0x9}, {&(0x7f0000000680)="9cca3bae2aa41d10278122b831cde10ce95003225fe8c0dd49f123a6214ff1bec3273473dd29dae4f82da57e20f3fad8cb34e65a962aab54c86d457af885b69c8e54091fa09ca32e04189aad2356b1f378a53d42ee146c8d97bd0b7ce51a5faccc88ee54a9170aa5b8c5842d1830471bff79c094916b8f9a8619ba56bed7a0be24a811d363a615961b8763f48cddad8ea0b951741135e9d39de8b6527867a230edf3da68a6ddacadb70e8a3392f9bb5c7b5b9c0e8194791fa7e9d42f08df607aede30cb18ed067175789c29ed11abb2ea0736d0565f8773aec53370110aae3bcbd43e4b102f34c2f1b5e14c06b49a22f4fa44936", 0xf4, 0x6}], 0x40800, &(0x7f0000000800)={[{@huge_advise}, {@mode={'mode', 0x3d, 0xffffffff}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@huge_advise}, {@mode={'mode', 0x3d, 0x3}}, {@huge_advise}, {@mode={'mode', 0x3d, 0xae4}}, {@size={'size', 0x3d, [0x6d]}}, {@gid}], [{@uid_lt}, {@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, '&'}}]}) syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67f90c0000f5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe00144d128", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:22:06 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x8100}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x400300}, 0x14}}, 0x0) 08:22:06 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') openat(r2, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x2, 0x1, 0x20000332}, &(0x7f0000005000/0x8000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:22:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xf0ffff}, 0x14}}, 0x0) 08:22:22 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x4, 0xfffffffffffffea5, 0x0, 0x100020, &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC=r0]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000240)='./file0\x00', 0x410982, 0x9) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0xba4, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x3, 0x20000000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000440)='./file0\x00', 0x6d10c1, 0xa0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:22:22 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x300}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:22:22 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x3000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:22 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xa001}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:22 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') setresuid(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000500)='./file0\x00', 0xfe, 0x3, &(0x7f0000000780)=[{&(0x7f0000000540)="2d958de7691ac956c18597f9e89455db693a0bb183041488c150e8225258bac33478b668e59dc31fa50f4465a674919805a6b256738304b0deb8480824d45823458f80248f0fdde2e49c3eb8147dba2e3b8847b2b017dfee874bd99d86f130fe1bd2468cdf4a61c554ee4a310b1eff716fc5e41412", 0x75, 0x8}, {&(0x7f00000005c0)="c41ce28ad8c3e3308aa2786a14911a88c536a9bfca08b22bb5d7b472e7b8c2f050f5a888cac9a61b2cd7b1c4a008989cc2d64824afd06617c4185c40fee9a377ec3250eec790424791966edfe07e648acd7a78c69f1c01cb473784d66bd26fd47566f1cc1ff501c80d46adcedaacfc276626d482a6681c230bd874c50dac66a899ab89173c2fda50caafc4d84a955428f2d25567039be6372da1d7ea46fa29271ee4e6dc9269ae526d39b9ecc24178398666899152b44a", 0xb7, 0x9}, {&(0x7f0000000680)="9cca3bae2aa41d10278122b831cde10ce95003225fe8c0dd49f123a6214ff1bec3273473dd29dae4f82da57e20f3fad8cb34e65a962aab54c86d457af885b69c8e54091fa09ca32e04189aad2356b1f378a53d42ee146c8d97bd0b7ce51a5faccc88ee54a9170aa5b8c5842d1830471bff79c094916b8f9a8619ba56bed7a0be24a811d363a615961b8763f48cddad8ea0b951741135e9d39de8b6527867a230edf3da68a6ddacadb70e8a3392f9bb5c7b5b9c0e8194791fa7e9d42f08df607aede30cb18ed067175789c29ed11abb2ea0736d0565f8773aec53370110aae3bcbd43e4b102f34c2f1b5e14c06b49a22f4fa44936", 0xf4, 0x6}], 0x40800, &(0x7f0000000800)={[{@huge_advise}, {@mode={'mode', 0x3d, 0xffffffff}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@huge_advise}, {@mode={'mode', 0x3d, 0x3}}, {@huge_advise}, {@mode={'mode', 0x3d, 0xae4}}, {@size={'size', 0x3d, [0x6d]}}, {@gid}], [{@uid_lt}, {@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, '&'}}]}) syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67f90c0000f5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe00144d128", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 2868.071310] cgroup2: Unknown parameter '0177777777777777777777718446744073709551615' [ 2868.108636] cgroup2: Unknown parameter '0177777777777777777777718446744073709551615' 08:22:22 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:22:22 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000500)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580), 0x2, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000680)=ANY=[@ANYRES16=r0, @ANYRESOCT]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='./file1\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000679307ff67dabfe22ecdfedb89c8f2a4900c730f36156c99ac8dbe0000516bf8bea57857ad8b49625b81343e3376dc998d9da0f929116c4fa19c341995a6b71384018752226530754f4a2c3fec7f57202000", @ANYRES32, @ANYBLOB="ad7d3b3c9980bd2f4f7c850db8d544e66ea0eb7f897af2"]) r2 = open(&(0x7f00000006c0)='./file0\x00', 0x240801, 0x41) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) lsetxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000440), &(0x7f0000000480), 0x2, 0x1) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 2868.115004] cgroup2: Unknown parameter '01777777777777777777777' 08:22:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x1000000}, 0x14}}, 0x0) 08:22:22 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xc00e}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) (fail_nth: 1) 08:22:22 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') mknod$loop(&(0x7f0000000240)='./file0/file1\x00', 0xc000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:22:22 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2868.191058] cgroup2: Unknown parameter '01777777777777777777777' [ 2868.203084] FAULT_INJECTION: forcing a failure. [ 2868.203084] name failslab, interval 1, probability 0, space 0, times 0 [ 2868.205680] CPU: 0 PID: 13657 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 2868.207203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2868.208994] Call Trace: [ 2868.209577] dump_stack+0x107/0x167 [ 2868.210496] should_fail.cold+0x5/0xa [ 2868.211313] ? getname_flags.part.0+0x50/0x4f0 [ 2868.212281] should_failslab+0x5/0x20 [ 2868.213084] kmem_cache_alloc+0x5b/0x310 [ 2868.213951] ? vfs_write+0x354/0xb10 [ 2868.214756] getname_flags.part.0+0x50/0x4f0 [ 2868.215686] getname_flags+0x9a/0xe0 [ 2868.216469] __x64_sys_unlinkat+0xe4/0x130 [ 2868.217361] do_syscall_64+0x33/0x40 [ 2868.218151] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2868.219241] RIP: 0033:0x7fdde5eafb19 [ 2868.220027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2868.223890] RSP: 002b:00007fdde3425188 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 [ 2868.225482] RAX: ffffffffffffffda RBX: 00007fdde5fc2f60 RCX: 00007fdde5eafb19 [ 2868.226977] RDX: 0000000000000200 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2868.228474] RBP: 00007fdde34251d0 R08: 0000000000000000 R09: 0000000000000000 [ 2868.229971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2868.231469] R13: 00007ffe2326ed4f R14: 00007fdde3425300 R15: 0000000000022000 08:22:22 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:22 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xec0}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:22:22 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x2000000}, 0x14}}, 0x0) 08:22:22 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef55157f85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f9d35c23553fed9401f72ded9a68d5482f156998effe0a537903d34165c94c5941310e069fc9922b9e3e6a3cb12b76de0ec41f066612c95a18f27", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) r3 = syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(r3, &(0x7f0000000880)='./file0\x00', 0x4eacdd354f1e1ebb, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) 08:22:22 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67ff010000f5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0712bd069d626c1def716d9efcb5e1657c2c1022d41089788fe", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) openat2$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000440)={0x200000, 0x5a, 0x12}, 0x18) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:22:36 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x40000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:36 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x34000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:36 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x2, 0x80000, 0x10a, 0x0, r2}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0/file1\x00', 0xc8) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:22:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf00}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:22:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xf000000}, 0x14}}, 0x0) 08:22:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) (fail_nth: 2) 08:22:36 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000440)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1251845, &(0x7f0000000480)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 2882.336010] FAULT_INJECTION: forcing a failure. [ 2882.336010] name failslab, interval 1, probability 0, space 0, times 0 [ 2882.339003] CPU: 1 PID: 13704 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 2882.340735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2882.342859] Call Trace: [ 2882.343452] dump_stack+0x107/0x167 [ 2882.344260] should_fail.cold+0x5/0xa [ 2882.345110] ? create_object.isra.0+0x3a/0xa20 [ 2882.346144] should_failslab+0x5/0x20 [ 2882.347007] kmem_cache_alloc+0x5b/0x310 [ 2882.347936] create_object.isra.0+0x3a/0xa20 [ 2882.348932] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2882.350062] kmem_cache_alloc+0x159/0x310 [ 2882.351004] ? vfs_write+0x354/0xb10 [ 2882.351850] getname_flags.part.0+0x50/0x4f0 [ 2882.352843] getname_flags+0x9a/0xe0 [ 2882.353681] __x64_sys_unlinkat+0xe4/0x130 [ 2882.354630] do_syscall_64+0x33/0x40 [ 2882.355467] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2882.356607] RIP: 0033:0x7fdde5eafb19 [ 2882.357456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2882.361579] RSP: 002b:00007fdde3425188 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 08:22:36 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) r2 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) unlinkat(r1, &(0x7f0000000140)='./file0/file1\x00', 0x200) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 2882.363285] RAX: ffffffffffffffda RBX: 00007fdde5fc2f60 RCX: 00007fdde5eafb19 [ 2882.365189] RDX: 0000000000000200 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2882.366852] RBP: 00007fdde34251d0 R08: 0000000000000000 R09: 0000000000000000 [ 2882.368504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2882.370155] R13: 00007ffe2326ed4f R14: 00007fdde3425300 R15: 0000000000022000 08:22:36 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x81000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2882.464354] cgroup2: Unknown parameter 'i [ 2882.464354] UdpLite: 0 0 0 0 0 0 0 0 [ 2882.464354] ' 08:22:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x81000000}, 0x14}}, 0x0) 08:22:50 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x9effffff}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:50 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x4000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:22:50 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f0000000580)={0x0, 0x19e9, 0x1, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:22:50 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f0000000580)='./file0/file1\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:22:50 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x80000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) (fail_nth: 3) 08:22:50 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x414d, &(0x7f00000003c0)={0x0, 0x19e9, 0x0, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="000096a2a55e00000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73301036156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) open$dir(&(0x7f0000000240)='./file0/file1\x00', 0x105800, 0x102) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 2896.213144] FAULT_INJECTION: forcing a failure. [ 2896.213144] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2896.215771] CPU: 1 PID: 13728 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 2896.217311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2896.219163] Call Trace: [ 2896.219755] dump_stack+0x107/0x167 [ 2896.220568] should_fail.cold+0x5/0xa [ 2896.221424] strncpy_from_user+0x34/0x470 [ 2896.222353] getname_flags.part.0+0x95/0x4f0 [ 2896.223349] getname_flags+0x9a/0xe0 [ 2896.224181] __x64_sys_unlinkat+0xe4/0x130 [ 2896.225123] do_syscall_64+0x33/0x40 [ 2896.225952] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2896.227099] RIP: 0033:0x7fdde5eafb19 [ 2896.227925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2896.232018] RSP: 002b:00007fdde3425188 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 [ 2896.233708] RAX: ffffffffffffffda RBX: 00007fdde5fc2f60 RCX: 00007fdde5eafb19 [ 2896.235300] RDX: 0000000000000200 RSI: 00000000200004c0 RDI: 0000000000000003 [ 2896.236884] RBP: 00007fdde34251d0 R08: 0000000000000000 R09: 0000000000000000 [ 2896.238476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2896.240062] R13: 00007ffe2326ed4f R14: 00007fdde3425300 R15: 0000000000022000 08:22:50 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xb0010000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x9a020000}, 0x14}}, 0x0) 08:22:50 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x8100}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:22:50 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x400300}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:50 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(r2, &(0x7f0000000880)='./file0/file1\x00', 0x800, 0x38) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:22:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) (fail_nth: 4) 08:22:50 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x122) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:22:50 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xc00e0000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:22:50 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 2896.507189] FAULT_INJECTION: forcing a failure. [ 2896.507189] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2896.509834] CPU: 1 PID: 13765 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 2896.511388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2896.513239] Call Trace: [ 2896.513832] dump_stack+0x107/0x167 [ 2896.514654] should_fail.cold+0x5/0xa [ 2896.515510] _copy_to_user+0x2e/0x180 [ 2896.516368] simple_read_from_buffer+0xcc/0x160 [ 2896.517409] proc_fail_nth_read+0x198/0x230 [ 2896.518370] ? proc_sessionid_read+0x230/0x230 [ 2896.519393] ? security_file_permission+0xb1/0xe0 [ 2896.520470] ? proc_sessionid_read+0x230/0x230 [ 2896.521484] vfs_read+0x228/0x620 [ 2896.522267] ksys_read+0x12d/0x260 [ 2896.523066] ? vfs_write+0xb10/0xb10 [ 2896.523899] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2896.525069] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2896.526218] do_syscall_64+0x33/0x40 [ 2896.527057] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2896.528193] RIP: 0033:0x7fdde5e6269c [ 2896.529020] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2896.533108] RSP: 002b:00007fdde3425170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2896.534806] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fdde5e6269c [ 2896.536391] RDX: 000000000000000f RSI: 00007fdde34251e0 RDI: 0000000000000004 [ 2896.537975] RBP: 00007fdde34251d0 R08: 0000000000000000 R09: 0000000000000000 [ 2896.539564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2896.541150] R13: 00007ffe2326ed4f R14: 00007fdde3425300 R15: 0000000000022000 08:23:03 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffff}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xa701}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:23:03 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000480)='./file0/file1/file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1/file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) readv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000580)=""/164, 0xa4}, {&(0x7f0000000240)=""/20, 0x14}, {&(0x7f0000000440)=""/57, 0x39}, {&(0x7f0000000640)=""/154, 0x9a}, {&(0x7f0000000700)=""/112, 0x70}], 0x5) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000800)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="30d7d3dde2cd32a2bf35dfd9f51b5235e5f7f4cf90816b5767f8585d4a08761075af05918e1ba0"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:23:03 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x906, 0x0, 0x0, 0x104024, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYRES64]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:23:03 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffffff}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:03 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x310b, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x1, 0x0, 0x0, r2}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x100000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71382f654285913141e052684017f1f5918d9", @ANYRES32, @ANYBLOB='e\x00'/14]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) r4 = syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) mkdirat(r4, &(0x7f0000000240)='./file0\x00', 0x40) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x9effffff}, 0x14}}, 0x0) 08:23:03 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xfffff000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x202) 08:23:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xf0ffffff}, 0x14}}, 0x0) 08:23:03 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x1000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:03 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x10040, 0x1, {0x2}}, 0x7c) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xc00e}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:23:03 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000440)='./file0/file1\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:03 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x2a0002, 0x56) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x57eb}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)=ANY=[]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x18190d1, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:23:03 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xffffff7f}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:03 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x2000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xfffff000}, 0x14}}, 0x0) 08:23:17 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x3000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:17 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x28f7, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:23:17 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:23:17 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) ftruncate(r1, 0x3ff) 08:23:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x300) 08:23:17 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) faccessat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x100, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:17 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xffffff9e}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xffffff7f}, 0x14}}, 0x0) 08:23:17 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xfffffff0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:17 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x4, 0x188) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f0000000140)) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x543000, 0x2c) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r2, &(0x7f00000004c0)='./file0\x00', 0x200) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 08:23:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x34000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:23:18 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x4000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:18 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0/file1\x00', 0x0, 0x182) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) mount(&(0x7f0000000240)=@nullb, &(0x7f0000000440)='./file0/file1\x00', &(0x7f0000000480)='btrfs\x00', 0x1012060, &(0x7f0000000580)='\x00') 08:23:18 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000000)='cgroup2\x00', 0x2000, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0xc50, 0x0, 0x0, 0x2, 0x8}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000580)={0x5, {{0x2, 0x4e20, @rand_addr=0x64010101}}, {{0x2, 0x4e23, @remote}}}, 0x108) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:18 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x90c01, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:23:18 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x8000000000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:32 executing program 4: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 08:23:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xffffff9e}, 0x14}}, 0x0) 08:23:32 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x40030000000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:32 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x52, 0x0, 0x0, 0xff, 0x7f, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0xffffffff7fffffff, 0x0, 0x99aa}, 0x0, 0x2, 0xffffffffffffffff, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:23:32 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:32 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) readlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000580)=""/170, 0xaa) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:32 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file1\x00', 0x0) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f0000000240)='./file0/file1\x00', 0x339) 08:23:32 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x80000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:23:44 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x400300}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:23:44 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(r2, &(0x7f0000000240)='./file0/file1/file0\x00', 0x280900, 0x18) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:44 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:23:44 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:44 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x40000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:44 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0x7ff, 0x0, 0x0, 0x400, &(0x7f0000000440)=ANY=[]) io_uring_enter(0xffffffffffffffff, 0x1434, 0x57e6, 0x2, &(0x7f0000000240)={[0x9ffa]}, 0x8) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xfffffff0}, 0x14}}, 0x0) 08:23:44 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYRESOCT=0x0, @ANYRESOCT=r0, @ANYBLOB="e2f6a3399a5845ab136e62d5f5c66cee95c58009e6f14ee34d482ec5b95e7b898bd81eb24509b4a07dc8c9499c709f7e32fce3b17af8dea5f12664621c9d8141f49143e8daa24d830424b45c29c0d467cbf6e55ba7e3af3bb075196a4ba32bdd3adec8a60c391f930ca6d63973daba80efe78f96eb9c93ccab3d6b74cccc5a2859c9d56ef2749a935774cb4d445ce507bca0", @ANYRESHEX, @ANYRES64=r1]) unlinkat(r2, &(0x7f00000004c0)='./file0\x00', 0x200) [ 2950.350914] cgroup2: Unknown parameter '00000000000000000000000017777777777777777777779XEnblŀ NMH.Ź^{E }Ip~2zޥ&dbACڢM$\)g[;ujK+:Ȧ 9 9sں珖뜓̫' 08:23:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0xffffffff}, 0x14}}, 0x0) 08:23:44 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x81000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:44 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffff}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 2950.384766] cgroup2: Unknown parameter '00000000000000000000000017777777777777777777779XEnblŀ NMH.Ź^{E }Ip~2zޥ&dbACڢM$\)g[;ujK+:Ȧ 9 9sں珖뜓̫' 08:23:44 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x100000000000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:44 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fff0003, 0x40005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1c762cebdc9455aa, 0x0, 0x101, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='a\x00\x00\x00\x00\x00\x00']) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff1000/0x1000)=nil, 0x1000, 0x9, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:44 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x1000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:23:44 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x9effffff}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x900, 0x85634f446c34dae) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x3808004, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xfffffffeffffffff, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000500)="0bd3d9235e47dd63d74ae63b20e91eb19dba24c3798ae71a09e7d7e98c1f28d215d7e3ab63272ce74b23f32ac629073b6d846ca3b5dcfe4525c7674ff317dd9a29ed399b92ac1d8a3904c111d72b0a381306835ff9451485acc1be8bc1d1e7d7b17691940a7fe06160d4e92a348f1e7c5d51c885305a22640cb010cf79833c67f91466f38d9cca7da5124c022135c8cdf36ac113f993bf34d36ebc3b83e55282e81d6a611def7700dea1b3a5a72900c5fe3d82444b02ee1a233169dd3d80ef9d82c593d04176b34093ff18131588bec32c62a1c092dd44eafbba1925052d7e22078254d53ad58c1eb2719b769a795e28122a047e0a70a5db32", 0xf9, 0x2}, {&(0x7f0000000240)="43d1ad925dfe60dd3c988d204d9f1b6da19245d9ad32b055810b4ac3ea4faa33e937", 0x22}, {&(0x7f0000000280)="507ee86afa111e8c4cf729ec381d", 0xe, 0xfffffffffffffff9}], 0x100020, &(0x7f00000003c0)={[{@shortname_mixed}], [{@pcr={'pcr', 0x3d, 0x3}}]}) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) open$dir(&(0x7f0000000440)='./file0\x00', 0x40000, 0x14) openat(r0, &(0x7f0000000040)='./file0\x00', 0x40001, 0xf0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000480), 0x2, 0x2) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x4000, 0x13) 08:23:44 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="85"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:44 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x2}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x6000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000008000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c7330ed359855e1c08dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929256c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:23:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}}, 0x0) 08:23:44 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x200000000000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:44 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x2000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:23:44 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xa0010000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:56 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x920}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x50, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x7, 0x8}}}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x5}, @NL80211_ATTR_BANDS={0x8}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r3, &(0x7f00000004c0)='./file0\x00', 0x200) r4 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) unlinkat(r4, &(0x7f0000000040)='./file0\x00', 0x0) 08:23:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 08:23:56 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xc00e0000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:56 executing program 1: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000640)=@IORING_OP_TIMEOUT={0xb, 0x1, 0x0, 0x0, 0x4, &(0x7f0000000600)={0x0, 0x3938700}, 0x1, 0x1}, 0x1) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000680)=ANY=[@ANYBLOB="0000000000000000392be84177ee4561360d0000eb3818e614679307ff67debfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(r2, &(0x7f0000000440)='./file0/file1\x00', 0x200) 08:23:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x3000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:23:56 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x300000000000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:56 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000800)=ANY=[@ANYBLOB="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"/382, @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)={{0x1, 0x1, 0x18}, './file0\x00'}) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x9, 0xff, 0x5, 0x3f, 0x0, 0x2, 0x14000, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x704eea05, 0x4, @perf_bp={&(0x7f0000000240), 0x8}, 0x2000, 0x35a9, 0x5, 0xc, 0x7, 0x9f8, 0x8000, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0x6, r2, 0x1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) 08:23:57 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffffff}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:57 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x400000000000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x4000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:23:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x1010, 0xffffffffffffffff, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x13, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0x4007, @fd=r0, 0x3f, 0x0, 0x0, 0xe, 0x1, {0x3}}, 0x7) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:23:57 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0xffffffffffffbfff, 0x0, 0x0, 0xa3e2d480ae8f3bf8, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) faccessat2(0xffffffffffffffff, &(0x7f0000000240)='./file0/file1\x00', 0x0, 0x1100) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000, 0x346}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="654000000000000001000000cd4c2a384281aac80cf8012a7442236fbc0e32954d5adf28d4efd9c26298004bd7d69942712fb32b67745b8e4800000000000000dd6d96a4b9a04a87e6e7b6c6708b28090df28bf08514ed21bc52feee5f28048e15a694374e66c7dbbacd3cf92cfcfe9b06b58eb760e3735a6e82fa6a96ce4b0c6918ed2843300bead163bbe716c764dc4ae231b0219aab6d588c4db8bd61b50154aa7c9a7647f443942628f90b3c6a09f695464f37b338f0"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:57 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:23:57 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e8, 0x20, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) r3 = syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000580)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:23:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}}, 0x0) 08:23:57 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf00000000000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:11 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="650000000000000000000000a6286a51440000"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:24:11 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xfffff000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:11 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x4000000000000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:24:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) 08:24:11 executing program 4: ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x1, 0x3ff) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f0000000240)="69e38e92a388b2a470bc29766b95623b1142f0ab1cebddd3624ec693c6d12b92ed164de50f2617ae21658349ef3d71bcabc6422ed58aa899a41a9146782ea1863f8041f87ca8534e0dd54a04dead8fa7ca847f82db1d3f871617bce7a7ced5dabd1040e186fb96963b7adad2dc5a9d7dd7d59b74a8ae61e6e6b56d46512c6373d0e72487e213f0b85245ee44358ae387a175dff7beb5489350eab7086afc746966e79135ddd42288e6315f6b913f0a4d41d554755bb00adf0f2f5e51a6b624f4dcc9a9a29443b3fb7c1e89c9cdfe7a57e22f5963c1058fd82c9c377dc0f2b7693db630de68", 0xe5) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$inet_opts(r1, 0x0, 0xc, &(0x7f0000000500)=""/4096, &(0x7f00000003c0)=0x1000) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r2, &(0x7f00000004c0)='./file0\x00', 0x200) 08:24:11 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000480)='./file0/file1\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4148, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000, 0x14}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="0000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f900116c6f0300000095a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="03000500"/14]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0xa5) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000240), &(0x7f0000000440)='./file0/file1\x00', 0xe, 0x2) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:24:11 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000440)='./file0/file1\x00', 0x4, 0x7, &(0x7f0000000940)=[{&(0x7f0000000580)="9219675412a74e24805372a45297b7f5a96fb230cf37f8c3a70aa7a78580df72f9911a46ed46eb7d3438f954ecbc41ce3ff9f31a0ba3b4504934276a3e7071ba5c3015d606999707ff59df596c", 0x4d, 0xa19}, {&(0x7f0000000480)="3f147818f6bb058d7d31c51fc364", 0xe}, {&(0x7f0000000600)="768798c88b1b6e5f4e4305cc849561949783b44908849d9967878d1e4017b4c1578de75e3a2b7da56052e7ebe5499aa77889d6f74a88bc3c8c7a01d42d405116431f34df1ac753843858a426", 0x4c, 0xdc9b}, {&(0x7f0000000680)="6c85c06b2e4ac3ebbbaa5a0cb372f413d449beb354f8b734ed4a3a54fe0efab3f82dc1ff06d60d08a182479c2a3edd761bf5f4e0a9860d664a80134bc98714fc58fa02159224582970729ce6431d178b1103e15db1fd1d3734c55e4a4f24def90941683453cc754e41f1eb2604bd58912718138792f789328ce73ff441ba9043caa04c3ed9d0f38c71a0b0f90c66cbfc05b5443b6bb86de5afd9c79f06f62ef5baaf03846ca901a0ca6b5949fbc1a2713c1fe62c8f15dd9a68e759d824b013a167aa98f657237ddac596dd5d4d85f82d1b4bed25c66fdcb32b1bafb0fbc9f00f02dd68d30420c699a44483194c1a26df", 0xf0, 0x1f}, {&(0x7f0000000780)="65d3a2427d07ee99e3df06deb4648f987cf1d30d1e2829a5d48c3b06df66398c04b05e016bc0411f54951fc1370bf7d464d32f8e9523067b61b6c53785abdbbe5fffd6ccb543e568a7c77f46ee04d660efd4ec016a28ab9828e45176e6144fea277b98a7f95df0eb75a906c6070f", 0x6e, 0x3}, {&(0x7f0000000800)="f9ca61e334362e3e514194de11f7857cd73ed57b1deb4cc39efb10e13cd52b5e9bb2fbac0f34f95a53239f65ed431373badea353d9c58fde5cbf7c66ce700eb827fe2cb272ab8f14508721aade52da150890b7289c1b648869ca57a9b598d217ca1f451bfbe22a7f8ebb4b3650398d635cffc6b253ec7fa5c849b249aa8f1daa11093076eca8e77d39bd55aad2014b113aea44068a036a922d3ce4f5fe9c2e5dec673ddce9ab8b7415f9261b303adb92bcc1912c62ab7c1d94279019ec0e982de966a2713c81040ad1b3705d3bca7a16515f92f6638af377d6c11fde", 0xdc}, {&(0x7f0000000900)="c14bee57558f1945e357edc93f5a95315893139b3ad1d0f944342e0b9c0c", 0x1e, 0x3}], 0x1000000, &(0x7f0000000a00)=ANY=[@ANYBLOB="6162e80a00006a71666d743d76667376312c7573726a71756f74613d2e2f66696c65302c7374726970653d3078303030303030303030303030303030372c61756469742c66736c303030303030342c646f6e745f61707072616973652c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) unlinkat(0xffffffffffffffff, &(0x7f0000000ac0)='./file0\x00', 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 2977.685127] loop3: detected capacity change from 0 to 112640 [ 2977.701547] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 08:24:11 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x8100000000000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0xf}}, 0x14}}, 0x0) 08:24:11 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xffffff7f}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x41, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) [ 2977.748895] cgroup2: Unknown parameter 'KWUEW?Z1X:D4. ' 08:24:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x40000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:24:26 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x81000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:24:26 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0x1ca) 08:24:26 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080), 0x5, 0x400) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x144) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r2, &(0x7f00000004c0)='./file0\x00', 0x200) 08:24:26 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) r2 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0xfc, 0xfd, 0x4, 0x0, 0x0, 0x5e, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:24:26 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x9effffff00000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}}, 0x0) 08:24:26 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xffffff9e}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:26 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x2e8d01, 0x108) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:24:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x14}}, 0x0) 08:24:26 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x9effffff}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:24:26 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xb001000000000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:26 executing program 4: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r1, 0xffffffffffffffff) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r2, 0x4, 0x42000) r4 = getpgrp(0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000000)={0x0, r4}) write$P9_RATTACH(r3, &(0x7f00000000c0)={0x14}, 0x14) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r5 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r5, &(0x7f00000004c0)='./file0\x00', 0x200) r6 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r6, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0xda, 0x59, 0x80, 0x8, 0x0, 0x80000001, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x18220, 0x0, 0x8, 0x6, 0x1, 0x8000, 0x4, 0x0, 0x1, 0x0, 0x40}, 0x0, 0x2, r6, 0x0) 08:24:26 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xfffffff0}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:26 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5402f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:24:26 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000440)='./file0\x00', 0x4, 0x4, &(0x7f0000000700)=[{&(0x7f00000008c0)="a9c9f12038ac589812fef51bf1d876990d972a47d3b5492d08b5c9ca6757ea6538f4535f05cd594b3ae0a6f237e48e404591f7d9c939343dde854abb23df59faaa0c5a8c550689fe002d5540642a2276817f24ec08906ad2a3afab74557a63262774048b5370df0c4f52f2d77f2eae697731aa535bd67bbb252754ea54270c91b0e8cf53ef5e1b14f415aa1f5dba7ab8257fd1571dd48fb1ffe68167b2d27d69955d0b35fd6cef212be57aa628036eabada5f363a3fc41122d5ec5a9dd162f1fc789846cbec8c3b1f39945a956712a5d1e562d006419eef1208725643dab4d7ca85fb24a5acf1a2c7d26a059be2ba80aa2540ccfadff217314926cf0121b5dfcd1fa0039002f7c9cf7481026678649a27ff36cf25318a649782c31a45231f9bba0d79d5864eadeeb55ce240b54dcd1ec255087f81a576b7b83708549ecb0316d49c229d126f14b721f8b230e39986c47f03eea848267a350385d69bf02be2d7f10a3a02285ad43a18fd0c8045d0fbce000b0bcd4cb5f6c5cd935df918c236dc5bbe695f6c9be08c663758ab668767afd261a56d802ea0d5b51e284b33180d8275365023263e5f21c3bef3aed43e17d8a611867afb8df199bfe20cbdfabcf85009457fd162d867608734d8e3b14e1477eea740054064049f421d4218b97a5c5686aebbb0c44a01813ec16ce47e093b8532816474d611722fd5a9a0a19affefb3f967f7e70f4df549dc391512ca96096573e9160992cf932fe9e54da4c3f4b506412c2cf5a9d97a6637fb9d283ff5213b022d9832686b85e5450ffd7bc2c8ced737c63f2d86f0452792997350a33c7e3e8a82e4e1c745da646937b6132d404641511e15e2230db00b64f2d785b9778573a173aea74d8cedb4c56589b305b4874f5d55310c1a224aaa63d7f2816751a63b256b2bf5e30fefbe74cad30ae96c271250981a6abdf8be90e89a623e8dd53f659a778520bc2ceb895cbe7639067a607a5ff66a4bb1f98ec69eef1f74b0d5939fd323eaa59eca9429b30c737e3622173f767bac8efb321553e09cbf37f45125eebe73b43d9e0d45218fa6e7d80195efc4db0334c44ba50394ee2d540331c1eaaa9e58ae2226c35f182fb883b2f43d9805ee0c3fe1e61f0aa2697e4fe30bd69a86eba3fc334738c88c7eaa51d0f2f4dcfbb0fd424ddf6a1e4db7af05995e7d49690c789339fd79078670c9588472591c4b5e2a8674f4bf1f99e8fa4a1c9b91da7e4097ed4b23bd72479e281d2cb8c9033f811b5934f5eb7b9301a7a64ef0c2d359a465c4c2b190d9f2e17c3c914c7a788ac758083e6507b701b726fbc6a46020a6164f305291382dc226bf26525a70bd307fd489bd7b8066f486694ebc19f24870756bb3a6f1a8cf5c69fcd82846e7a1ff4e3c7357317f56fa510ba7da05add1e9a12bd92cadac07da6218e7f25ff1e39b250ea6ea6bed3f18d08355cc16197e85e6618e20524d3ec386eaeb4ec02a21e3e00e2a010a8e33e65cf8ac350108a586bd3e018045fabe4cbfab96f96d683d1135a754b08d48ca075ddb8edfea3e8a0f7d2572285f5199e3f75850a0894e3142d0f45f9277e2c2e3bf85dc231a8bce90346434294487eef98f269f0e0140982b9a7d8d87249e23aa433b405d11da04056d195db1908bd0b0a30f237917cfaa0b1fe3834bc2f6b87c8c54ccdfddcaa9030dac39cf843f6c20396d4a1906fab181c43c316360414392c4fe34efd9eff45ea42e7bc73a59353c6a101c4470a14195d5b667ddd93c5333245c7e4f89ed12c76a7a326657113dcbc5341691463cb03281bb8697156c4cf064d44765d78f677e02aa3f530757768bd756cc5c467693de8c50ad4019d103ddb2966fac2463b9f507caa3c8cb9eb7e6e2c076d26718382bf259bd0cb25b4e9ee97ee38b5a8346eb94e9d4f2cdd26a49ae35a39075ca035502a1e9bdcd62e688114b6b826263e8cf9b7f268665d70ae2ac3338c060b281ac9c64461a484f3a4867cf19aae4abc783cf96a0c4cfed2a9254951c4341eed5c502af672d2baec9886fb89871e65138a683b32d70b4da7d2945e4d93f38ea15f73d94212e8e93d9551a8389d5bae168f219a1775520e298e1bad22afda8ed2f7579fd5371b2a5fc46e4006f1d0753faf5fb9a89196ea33f44af60fdcaba0267ea2f62b8977e1e22e4f2b0fabb0166e2d671c21e17df433e63af9b36a1e684bfe7429c57aad37e5bfcf51602e65e9ef7193a4007aef8d93d6dca9aceb683c65308218b21e548229908f29aaa8c8048f1d947db866ab8ca35b0a7c171338d3e1e6bfa3bd440dffceb4acd0401c9b9e45fe9c690d23c0afc367d730c8a2bbc8457c8cdc570210499cd57eb487849d906394edaadf49c14f68bf9f40ec8770321bcfd2b24572e1d89e4787de374f671dbfe42ea74c7b67eb592b0e0c05911b017a409aae345956377be2cbf2217f3caf77a5a6b61bd65b66d8d587ba9819b26430cf37fa7289be3448cdc1d0b3f4cc7bce28c9ec7bef3fd8366af46077976dca16f1ae98ee64c10272fbb996c40db955305658659223cc6ea3e6c524cda01a5b2e8a702a3257e6912d5f361e47b0081dae36405ce53920418aab60d015a83879034cccf922dd0eb4c0c61ca48da5893a69dbd7253e1890675fe5e3d092be0c9307b8394de62abd6f5baaa84ff3748c2f4bc2116398edb984688b291995048304dc2ec4a73d0fc1d0ed9e903e2a8ae8f66795f93718e4bcfcc80b028522adf5211323ba897baa6f753957568d78a12fa5a0d41e6f017150087c392be1173eac0852100f4d4328519654db3fc4c52cb85a8e74f88c169bb7c6e6a5a6ff7f278a65ca416ceb17bf5a4e0b5f52785446636edd6dc9a106be8890de6d171294e813bad71f52bf5f4daa2c71bc657ee796fd80557e2ce06ffab268d5065a072ab79c5bb5a3309b787a0d0a03f48efdc1284e31eb502488a084660f1f490d58cd223eda1405d5169401648006f8ec66c2e61e78296306758bb8c741a90bbc2c803945b0b80bd102aeb5f97296ae11f37c42d57ac16fd45a2f641ff15596a35bba11ddd72dc0ecd7dd46249f4337dd8a47faed73766fd2c4212c9d55a7ca473d2992c74d26eaaeac566c67e68c5834ac2eeab1853ea7a073f0263712d144d46ea0b175118b6077dbb40f711ebd29096bfdb2dcf207ef791d7103d815fd2b0b086780f4fdd71b50508f27e4539b645a2d831cb8eef9b7ec4b34d80fc30daa9f3f00c5787f3eaf200e14e89627d8654b4e61fc05d29e06c69f3ac73904577fc96b0f039877c1ef2d613ac5322d4ba0f87b87666714005b594b71d3e1e5e08aaf2616748d7f01224a97125fb9afdce119c04c9a9d0d03def15005d3da9aeafb5864fd30b0356ad7fbf4d94cbb3a3d63a180393a8f7507117164267b239c585cd2df93979e0404319a06b215f54d518bb5eb0cc32f8b0d6e1dd110fe87af4ba408f2338074f1c04269f4a12fe15e1bc46ed4e2b2cd3129fe10edc4e6d4c6cc7028c76b3a7eb93d78f5879eae9693bd7994c7e22ce0c0d49dc310c96d93daaae6439f7081b7b820cb96b72c32d4c6b38e6935934f775c93d05369354b23ad5e9ee97cda783dcb11b34168f6a34e481b643818e12f6a19535d1f218064f013610347638c0e0458e2ae530ac88c5d8ddf97448e97c75d26ebb97b43fcf18c18d3f1a077a211cb31556c46710bcc22ed453303046d7ae26aedcac451559af0971cf4f3aea85f54742c559d519eafff4b57507940fafab106b496b76aee8bb49040976acc38d595441837ace9df33852791e6599407e2c8895429ba3a8b182415975ee3830d4a9d4390e384b1d3747e8ea7370acbd852f89d54c6b7f4ad69708a69d8f0ee0d2762863cfb01bea3bd596b75dd63a50a41b43f2811d224ebbd9fec2a60d54ed9bf040d80c074a156ee0dd71187718a995ef52d28f28fb7e3c9877c90facb92c85a9d9e47417da9d69c31b005934a17678cfe7c73b227318f2eb6208defd2d8c95640f67acb39d331f183ad3d6b6f451669000c475ccbc40da1a15bb9eba0ab0e8cc534423c0a0a6be045277c2d1f23935a00c5e842b87b4a1a8f2f98e47203c9e6f9211a0dd8d839ecc2c8fd684255abae31f37af3f5d818d8b357cb20bb8843937272f5e1f7f23020b900313913f2339fe995a072821ebdc11966b2400d70089561caac9fc0cc9a45c701f6b01f301daa58a12282348a84ad0e6989009b08fb898762754fbb914068a3aded0b582a289d9c6998ad60273ac75ab1c748bcf63da845b970c2188539e10bf077df4ce211084b127c9d9285a0de9e587c1a7aa40a0e4fb57091e730e7c527a340fecfae45968bc79c572e4190aa62fe202e5bb652e5453bf4683ac5df25c1739921b7b405aa1714933edb0341c5cb2e94800adfc7ce2220d7dd13f8f7e26755ea222033fa85e9580595a53f568e8ea4c666aaf99cd12612792aaaae1e9963aa93d0fd533334ff4c7f3a2f593d290023cc44ccce63af0614a2cefdbd65766693ef0fae5350a0ba5e2c7125f4e3bc388cf2d1b0b503ffd03f02e6e48eeadfae5e99b5457aeaeb004f9470f016678adde4f5ea5fc88f721f84f6bfd3d33a84f966ba02409603ac8f3bf92db9a91df5f9e44558d791ffbee1b5a145973f5ac0eeec9820dcc4d9063299e32afda49d5df7a24f5b62592daf4cdbf6014f65f91f6c459087e552f603aba37c28859499574f907b31edddd5a81cc8c29d16d1fee915d7db84d365f707246d4dc78c26837e11ecd46f7091740ab798d508e032f24e9cddb5050ba43dbcfc4a136695f7c17f5ef750b6b5e98e98233099823f7bdb883f9338107e11859a4d99c4a05b39dcd4b9f19a65a8c6aa742a7a18b90d604ac1d73d8e3b8ae23864bc4d706e920b5e06d11f7e8fbabcdf16d5fc9a367b90d529e4b5ba11f5441004c4b982ba622fa87a0f47420bb90e60e30d1b5c6d4929022952da4d383f0a76c1659a78ec97ebabeedbc486768b832a761e851df11feacad6f52b1d584a0b30e9538128236355017326a02ca591e55a3bd0df38a3f797e9655fee536e8c800485506e5e2a8bd3130888f5452b8fe1dc7e6520f237bac6fd3d053d9bd45b167a7212b47622c45198599adc1f987b110e3cc09530664cc5088e6f89cb20518199bf1c3436678d801090a719f82faa15b28c726cdbfa977cbce9229ff51f64fa7f1a5fc088c8c3cf263e865fc293c7d0f6cad64201ff653b5f9e475312511aae70c189beb8f4bc4f2516ef6bbe981a51b15a85932b836689edc55cbc429fc3b442c96eda924075d21f63cdaa1b640b921636163de32c6980c90c24a2173f5fed4260308d558cc68753024c1f1f1a07a3ba7dd5086876a9fc611182cad334c9db24e4d44bf642e502a60363e7fdce0e4e0a012956680db24e35afd2bf5671207cd15a8a655029b95e22c64a54d8b2371bf2230a472e31fec6580c6e43f786c2938d6cb95e4dace1d8bbf7214b9673655bd45c28b3f90e621f11864533fdfc5d541740d6a4c02e0aea23ff31bee52e797e31e69b123585cc879f7cd537a0de82a0185d30ee95618f31d40c799ed0e3fd3aa29be3225d9e9ac2b93c1561e496f8bed71a3824098e25e8ba708a1bc383e28fb8285a5ec69926ae9ec2f3a471c93d580eada498fac07a28094cbdac72f788524d66fa085dd2bc515a5ef705bb9a76912c63d0dbdd3f66465482fdbf08c0060a616ddb494663ec11482a40db5aa9fd3f0876ca4576fa8108033331005a8df1a9f1f9e16f8272d3", 0x1000, 0x100000001}, {&(0x7f0000000480)="53cfbbab11ca3c5bc844f615cb10808160df76e6d29952bc8874a1978c18bd", 0x1f, 0xffff}, {&(0x7f0000000580)="b534d1f4b9820aec09acf1d74f6d96acaeb1223fa3e17f964528dd51d75d646393382772d88fe2b78fe71f0f47b7c6f35083ee852d71af7e048255f93dc159e08f28721b6330bf5f1e7e7e22264f278c6fda4915722cf978adb450594422f0321c541935fa5fa706fb98af698a55532d7729f9563b15057c4ed55c90c55419363e45dbebd41bdfefe5801a8093923d37112bebb3ccd7f1086cac2782d020a2e38fe0beb998826a6c5c", 0xa9, 0xc6}, {&(0x7f00000018c0)="d61010226e77ccea2b943e03b212273796fe7475fbae998d0af6c9dd846fce5ff073a01d42347260d473aff844f31df935d48204842956690c9ed77a4b0567ede70e552bfdc3e1916dcb729921a5bed594c1b293bc772bb26126f8ddc27fbb37ffa429835e2ed1def7e81a34703daf1299200db23089976e7e465e89ab991366f87de4f90bb412194c6f380116e8ba9ad7c737658ca2a20eca832b3b", 0x9c, 0x20}], 0x87400, &(0x7f0000000640)={[{@dots}], [{@obj_user={'obj_user', 0x3d, 'tmpfs\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '^+[*'}}, {@subj_user={'subj_user', 0x3d, '@@$o'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3f}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x80}}]}) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:24:26 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file1\x00', 0x82dc1, 0x20) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x1, 0x146) getxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)=@known='trusted.overlay.opaque\x00', &(0x7f0000000580)=""/206, 0xce) open(&(0x7f0000000100)='./file0\x00', 0x440240, 0x119) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:24:26 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xa7010000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:24:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}}, 0x0) 08:24:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x800000, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200000, 0x100) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) [ 2992.326386] loop5: detected capacity change from 0 to 135266304 [ 2992.348425] cgroup2: Unknown parameter ' ZU' [ 2992.359521] loop5: detected capacity change from 0 to 135266304 08:24:41 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b713843f7f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="7f00000000000001040000000400"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:24:41 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x8000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:41 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000240)='./file0/file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000580)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="02c6aaba4c1c02015f1031ffb6b80ec2785563b00c073a55c6"]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)="037ec052eb7052ecc311eb97be349b472124662ef4dede168d2cc6b84523e469f7de3551a997ff1a436a6a460d6c7b3b654058217932b9b4e725b61005069a94b0023b61ffa96663ecdf9beb68cbd35d7220f33536b1ffa44c6249741c19fb3b87fc119879864c8fd9e2289f682666006227", 0x72}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd=r2, 0x2, 0x0, 0x5, 0x1}, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:24:41 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x200, 0x0, 0xffffffff, 0x3, 0x1, 0x40, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x9, 0xffffffffffffffff, 0x0) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) r2 = openat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x230040, 0x6d}, 0x18) openat(r2, &(0x7f0000001500)='./file1\x00', 0x1c480, 0x90) finit_module(r1, &(0x7f0000000180)='measure', 0x3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r4 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000040)='./file0\x00', 0xba48, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYRES64=r0, @ANYRES16, @ANYRES64, @ANYRESOCT, @ANYRES64=r3]) syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x2, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000500)="2dc4cf94f57d2a7b8bdf69438c25421e0c8ccf648cd49b37526b6ab4f44708e736e083a3dafb9ed30d45a1e54b2a348f7f05bf1b70dc7d617ddacbd7d669b8bf22fd8a8889b4c1cb72d03e8f2d75d4f08c834fa63548500e54c4954227bd697b2cb4ec0510ca1ae54eb2f43947efcf37b68dad9061199817079a0f6e9f442ff070039aa173ae0101e97296e6b5e3ecb80357a71215c6ddf02c9357eac652e920e0759a2e7ef3081364173a8d0da8cba081e6943c0f092f490503ed8f8d94da8475d487a639d76a65050edc810d39080a35d5b4f92f4421e21a233ee0f66f8f5cc58c9810d830aed30940aaaa3ce7acf9442ae20c4c7fecd267a4cdb1cd04e262570a0e4d22fe757169a99ff7bd35bb4695ac0759215323ee7e47833b5cf7f95a15cc6266f61c0bce645b533a2616785e5659521865a35d1493196d0753b39dd827d76c0fb379f25a9862b84a7375dca1210a3621590bb7b8d4ac5153e0edf193b8711d689f070a9c18a8e5ae86cdfa2ad0bcb79eb16eafef40553cb9d7abee94398bd89c151352f2d8a7af05072277bc335fee21edfa18c375763eb7c362443162f62f7b57a83a8cd66db73d7756f2f3a3e58e00a757c8a6760bf1c2821fe111e2133619335909f8c8daf6bd3025b46ea0afb533e5bdb03e0f5ed0c9dec57ae872b854207979072ca1ac5449917d23a2c95cfa95809b7713c768efc96fe50a9ba0011d3d378d48dd6fc5327d183ef546d26b0603cf7b3c672166678df361ba5f5ecbb55cc551c1b0c365d166c065460c80e16528124f8067b3dc59be944d87938450f49d3bf84e00fd397d4f85edbbfed00eb02185c38229468a2bc7c5f11b0a65f19e2c9f838743983df0de79230bfd2087d6a93d3a3f5c07825cd9f68eb5300b546092995041bd34e23a88e40b3a6d99f8a648799374cfcca37f866ebfe299babde778d5aec68b93b3066b2d9853d1b5b29d65c4a8b68f506cafdffbe1d21ea790eb9ecbc13c16596a4438b25257989e8fa39732cb701092d7499502601624713b5028e2e7be9ab1a64486adcb7d7d401aca69e7566933bff8961b9b7a9d0317648a798889afdb2a01f5fd713b868b81343d2c4766d74ee15c55bf11f2c36b1a5a113fda3ae04175fde874c6fc6bf03413c4e5a1e633dcd30246c8d650c20c9918f23d58c02289a75d8696a64046ccbe675c401d27cbb5a5cbeb4b5367501308df5cd320fa34ebd3e682e8fc8138b1b76d4ac07fc371068a1b794cd6727d20ca82eeccc64809a3b75abd82ef6eec0b895d6cc535f664d5d6a2ea8e3c81e4624505085ac26bed0c3285eef3fc4b6103a4f1df40848c679a38e507e7581e2c0b42d21b3c6cce44cf37351b36acf60ca3db5f2e9c0c7ab17d6c96241ce4a1e69024772cb9ab85be49b842dd50b8791d4984605c3d23faaa3310ef5e08e8f1fde0746f95221121e240a177360d728e6d41e9a56431d1503026e71bc4781c534d689eb74d7086505fa028d81a86e5c660641ad08df7fc8b78efa046c7c63a41e4dda988343e5ea813d488284bd745faf28b6894ae72d9d0d4e9f19727f67cb0dbe7cddba493ce65053b7bd748038a49ad227e0ee22b4e5d6255523a737649b7e1967c6cca10114173356b5b8239b21c7ffe022faa001b46b0bc80111952cf7702715b7efba7be83f7610e53f26f7bf77fb570f6278d1d449534975d4cb3e51756c7f5421d7ec40ccfffd728c3800a641b4c92197b5977ab2a4b52940f11c4612617f73bf1c8ed4e37e660a71e08271e0e8089cbc0a54c20548bec37c84c109a13d7076bd831ece9863ee7175b8ba13bc3b29312d459cbc8b132ad515632ef44ad15d2d4442ff30e6789902b5476ca73ecebf8424f803cf660f277726d1ce6fbebd29f6af96fdfbb252996e5cc7491b7be25f874f21b94c7dcd2cd1e43e752e3fe0af0f20e36fc88abfeebe7949932023c5d1c0b08ecfaa6b3e797d1975af64db4c87c904ebd662e9fd8533aaf3a72b5a715a941526bf6441d4737b123598a74281917f46c03c13ed0581a07a7bf921643c0d8b8be18cf89389c2cf99f46d6cc0a8894ccc948885230681b1a4549351dc80d353f029c4136125a1a50759af28884e6ce81e541a1804fe2a61016ff7fb16db074640027bf51230e894a355b8a0c805486912582113a2d8710da2bc498719db7c8e6ac5dbe5384be24eefeb4aacd460684ae4f41280f97e868c8870328fbe78875007150aaa58bd41fb5483817b004106324fbfb06fb3f183455c2269603456f32fca81d6a89ef3619f4eeb4668e9833948d96043d76087d4a032cb576c024e7b05424df872cae921aaf5fb1ed7f6bda156a7b8e3c5946dcbfb2577c2156b2cf990a874a48de1e3f1e1a00e97b5793509edd7fb0130a18a570838969537d0091adc56746d39528c2ef42fe24706efe119c7d4b8d7ed4c4b47474fc298f84ee899677f817a5eaa782a38e908f0016b3457aff5014ddb56b7db59d8a27b67286861579810088523dcff4bf62e6778222c92f700bbfaab6b232627bb9b1520ac1f14bad1f43c6a66fc5e45c8e10dcee3893fae56471698e525ce6e86e0818c619d91fff07c6ec535bea7d78da4c644f12dec467c85e9fe28bec7b3ebe6f5726308edc23ca481b5b862c50fca2d2c0aadb4cdb0b2e9407f0c8d64d75808fef2a412c4569e761cceea9b5cea0351bfa23d6f6bcf48417edefb53fbe6f262925d96b641d65ebb8859d4bbe4e2dce3e780c295239927a66066e08b425ea8f92a13a7c8bc491f91378f0dde5c3b36bdc4c5187f083bbfc63ce7f9414a984db3026accb1a1ca469463432bb5c850bcff277444d6b19e4345e4644c2fbbc52c90345a72c5d86cc6a4758fbfca32fd9f6159cdf8c9e7b827c433f58aa57d69c7ff5fdba42fa81ee89db48e353de2b01c1907d5d9256be14f6a795f60f8adf2aa5c42da4fc6dd3fd82a6a77be86cad5c8261909cace85a0441a9473b3601fa94785afdd2008742c48e88afc2f01436b199497cd87bb62001a5db8249e297077bc03a445e61a3328868ece88bafecc54b292a5c3630c5da94aa107164d7127e55a35e16e1ac4bf72e452ebc79c3d4f506a73dd92aeace881960f1b3c5b5801311536541bd7c5b4ee2afe4f0f6a422a8139ff5213a6e11195b95368a806d27e9f069e29c70393845a89b838f7d11afc40836c8af9287e1859833a5a07a0f7b0edc88f0492913e675a02f7c3d6484e116bd3b455bd8f8cb3a067d7e5171a06c27b94249929c703964e2c84fd8671a9a99d4c0f063fcccdf77cd7b08b00d97c753282b51156ce629cdb62c9b923d78b2186fbaa6dbe0ea776d2311605b12f99e0a378338d41723c161dc05c9fb850b2ac15d7befdc1f9b2ff74e83383e62f45290f062eb533dc9c6643f456c81f20ec6f4958b9c297cf15c8997f9d17a3ae795d4335441f0760f50c5e25b9663cd4e548b58a108ad29c070b2c08de41048653e13b376ff640ab8c6f152617c4c3af1067cb6e3130f1d0a58667c77b6d5b9cdf19728a28f1f6266b37a01bd612534363cc71f0b64067267f62cc9bf887245bdd01eea315ba21bf6a5467050b843ec395da8dd1a01fd727c4d78ef0736ea4618a9cca54fdd7fd863bc5c3319f66e2e57642093958e9b1a8df4f5604597ce6d7bc41e7505e79d2f16e884e114af3a6c6a1cd3231ba29662d7ff0d011572e055383504e273ff4d073d7044d86a695b58b62978004d1f1860b59f44de1f4421a6dde2c7415278aa1e1a1d1d8129cc1c924120545181e049e69387db5ae7da63907cedf0995ab94125eac4590b3ea04c63a794f15694e5de9c5f6954068ca3d299ce48e803b29fdaadb0033540483da7015c9cefacfcf2d7dfc1d8c8972de4c52ed1f8813cf0277171c03de0ce695f4284a5923dc053ffc55027414825112fc5fc46b4926a7d2246b2be5e2471f87c02361ab2d7c6280b858ce97fbea661047df86c4d6efb435cbe7aceca3028d3f82c8f68c1bc6b9b7117ede97d18f16aa477dc5541548a7532ffd552d29c90e4d514e01c3fcc543db57924109c81b786b42a49e779f95c1465ccaa484ca03d7e52d764364ef24027ced745d27877c156bbdbfcc5dee2ba4adfbc889919810c2df7ab3c4076b68731b57476fe92ea9989dadab35995497fa3964c2f0f613e08f67917dc43955daa40359a2b9d58e76a6c9ab34601b1cc758f68fc025ec1455acf8828dec490a563f28ebf75dda852b979879f9c53ed8d52985030a1a625170e03afd6d3f5c58e0dd919a462cd49d4d9a0e3992a1a7ac591014375d4a0ec23a3bc75fc1351d20c33722b4c0723701eb25609c468742d664ec58c153e53dbd12022ae3f6ffee803520f5279c9d23546a7dfa9b1f98100ea5ffbbbd37da1647ed5528fd8ad181c6060ee7ca466cb7f9b5c19571ad2b13a29feb0e0d070ca570cd170c9a063a78f56145d12d748f8c13ca8736998f00e02f3411da7a63b022fac90b8c5e93360e6727849e5fa497d8f7ac6a4fc6527005fecbc6fcee58b5f8273fe48c34645d02db8642239f8242f1d62537bd6ce4f114777d0a98d3dd89ce13051d4c8f26a6f7ab11a95a7c8b2a1a29f659ef12e05c08cd1f8dc9cadd992fa297c869519e0bda73f0e32e136c4298180fee8664052c0e55fe9c61a3f8f272655137aed4741bf0bd15a76e0dfd43ef5f3af478e0fcb5c3ad5bfd34dd8fc0a59b166effe0a210463d963419d6bd7161c72ff04e7dd10688025f37a81c33a06b303af07222d578bbec03d5ec00bfbbee9899004188c1f62aa87dd83352f62c5f0f194d81c8d348488005109356db9f088fe6ed6edc20cb0168b9a711b8ca61328ea10a09ff801b2cb6e8fb2349490b81b2016352fa13f74b571e7aa49bb4d1c1a205e9cb9dc8166cdb32a71e9f3f627e03afab2730d2dbeca89ccc9eee44171d05ae1a6523b059e03889f9f81d3105013a3870db0c4b8485135fbfa513062cc22aecd5d4a2d6f7c771302ae5112ab6c7d93b256614973750627e2a47f11462567897678ff4283e81e909f1e6146dce70e90c2ad2d3349f28b8161c273e23d96844fc237706cd45b029ec74d92c3b6a55d132aed8f9a5e0e91b571b3713e11fc2e2a75afdbbbd2d6f78dfe0d1ee39184db8da493a04c47d15150c281d495ace8e18d4505012cddf16fdefa08cf3c52d3e3a3479d9c840161ebd7c6de1f74c195c1a9201c155cc1f5b3689becebe45fdb5ad0c9b952997a019c2a694a86b136f437f073a60edcba5cd41660634eaf87ccb7763ab5b68b8ebb90cb630a4159bd4d34b2aac453d7b5bd15dee6dea137dc02ad78cd4a3e4249079245a54646bcd63ffda45b4cf7e3259fbaca7ee1f49badf246e953c9c2712ece683382d193dd712edf7cdc769ca61aa02e6b491c9ca4406387bb044c464f53cb5fef3a2d5b39e3be1760658aa098a2c3a4a516098b2583e035e9eeb366752d602dfa7a64fa6c56b0ced999c0077058064da0e853ea3668937c2d13dcef2e7bb736e054194dae0bb7daee0791dae10b53a3abc7a361a9d3a1db91d5d414cc8818c72eb147e1cc46ac844a9245a8be89653b4e18634af78add07c1ad08f926c5411aa7e31cb025eb13df0ad7ebe6a92438c2da882a558170207ec7f58c332d3f64e3b2999592b17578bd4c4f5743ea1017bce2d59977fb49464ba28898866087cb49af50026b484a05ecbd196d4340f5147621f8dadbd675f16014d98aee3657db10a274c89c42b7c713a4850ca643d8fc8292a46bc48a055168", 0x1000, 0x4}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000000200)="843056091f68cf19bd89cb1e932ad09af499c352b8e77687ad0ee45d04454fbb5861a555f87fb4129a1268f84a676b84f7b71a7673e889f4d036759c391f5195c6b2a58c686b4dbf47ca43840e4391153dbdc216905a87ebbe3b7c52974a5b8d992ce2f0777b899a74ce10485f15bfa077e35e57ed077540a07e5c085a19e4b83c4e4f714c", 0x85, 0x1}], 0x2150806, &(0x7f0000001540)=ANY=[@ANYBLOB="2f25235e2eb43a8b2c6d6561737572652c00e9ae12fefca0f7215e75445889712694affbbbb988f8a5680a46db99439d3d"]) unlinkat(r4, &(0x7f00000004c0)='./file0\x00', 0x200) 08:24:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xc00e0000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:24:41 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xc00e000000000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0x0, 0xf}}, 0x14}}, 0x0) 08:24:41 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) chroot(&(0x7f0000000240)='./file0\x00') mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 3007.003162] cgroup2: Unknown parameter '01777777777777777777777' 08:24:41 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x40030000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0x0, 0xf0}}, 0x14}}, 0x0) 08:24:41 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x7e0714ff57b00438, 0xb6) creat(&(0x7f00000000c0)='./file0\x00', 0x21) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101800, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRESOCT=r0]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) 08:24:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffffff}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 3007.181169] cgroup2: Unknown parameter '01777777777777777777777' [ 3007.198587] cgroup2: Unknown parameter '01777777777777777777777' 08:24:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) openat2(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x602080, 0x101, 0x5}, 0x18) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) 08:24:56 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x81000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:24:56 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0x0, 0x29a}}, 0x14}}, 0x0) 08:24:56 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000440)='./file0/file1\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000480)=ANY=[@ANYRES64, @ANYRESOCT]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file1\x00', 0x845a0, 0x172) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:24:56 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000240), 0x5, 0x200000) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x11, r2, 0x10000000) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f0000000440)='./file0\x00', &(0x7f00000002c0)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x1851019, &(0x7f0000000580)=ANY=[@ANYRESOCT=r0, @ANYBLOB="a091373e01d801cb3e708096fe6e28ebff841f9de9d7e202036b3a841341937ff91557274d82566876a6289b3dbc67a9afe4f9b95fd50e84a4d4b6a5b309e97e5f66bb2b54d8d1602ebf7a876d4c6a446fcdceefe036423bdf26472d9cb1a6bcc79a97f5ef68ba048252d211494f6b626f1cadc8e9f544e9285211546950d1f123e47cd1bb6def7b3f3d7bcf27a8a6780dae2083dff338b62134d5aa2f6502c8e7", @ANYRES32, @ANYBLOB="2d324efaf53a5c32e617cc3c52b82c05032ee09d95229243be"]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0/file1\x00', 0x5c) 08:24:56 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xfffff000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:24:56 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0x0, 0xf00}}, 0x14}}, 0x0) 08:24:56 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:56 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x100000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:24:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffc7, 0x0, 0x44000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:24:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xffffff7f}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:24:56 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x9d, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000580)=""/191, 0xbf) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x1a942, 0x102) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0x0, 0x8100}}, 0x14}}, 0x0) 08:24:57 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r3 = syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="0266696c653100"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000440), 0x1}, 0x0, 0x0, 0x80000000, 0x0, 0x7, 0x3ff, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0x68a255bcf09a7832) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') syz_io_uring_submit(0x0, 0x0, &(0x7f00000006c0)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r2, &(0x7f0000000600)=0x80, &(0x7f0000000640)=@alg, 0x0, 0x180800, 0x1}, 0x401) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:25:08 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:08 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r2 = syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000480)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x3, 0x0, 0x4, 0x2, &(0x7f0000000240)="4a9dcf09d215fe941e15bf6eb159ac313a7cb6e53c11", 0x3ec4, 0x0, 0x1, {0x2, r4}}, 0x8) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:25:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xffffff9e}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:25:08 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x4090, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x6b9a, &(0x7f00000003c0)={0x0, 0x9d55, 0x4, 0x7fffd, 0x186}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="0000000000000000000004000000"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0/file1\x00', 0x4000, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:25:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x802400, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_io_uring_setup(0x4ee5, &(0x7f0000000080)={0x0, 0x806cad}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) open$dir(&(0x7f0000000140)='./file1\x00', 0x80000, 0x2) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x2160}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0x10001, 0x3, &(0x7f0000000080), 0x30000000, 0x0, 0x1, {0x3, r5}}, 0x4) r6 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r6, &(0x7f00000004c0)='./file0\x00', 0x200) 08:25:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0x0, 0x9a02}}, 0x14}}, 0x0) 08:25:09 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x4, 0x188) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f0000000140)) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x543000, 0x2c) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r2, &(0x7f00000004c0)='./file0\x00', 0x200) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 08:25:09 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x200000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xfffffff0}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:25:09 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x28f7, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:25:09 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x300000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:09 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0\x00'}) write$P9_RREADLINK(r2, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 08:25:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0x0, 0xf000}}, 0x14}}, 0x0) 08:25:09 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x8000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:25:23 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x400000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:23 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000480)='./file0/file1/file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1/file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) readv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000580)=""/164, 0xa4}, {&(0x7f0000000240)=""/20, 0x14}, {&(0x7f0000000440)=""/57, 0x39}, {&(0x7f0000000640)=""/154, 0x9a}, {&(0x7f0000000700)=""/112, 0x70}], 0x5) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000800)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="30d7d3dde2cd32a2bf35dfd9f51b5235e5f7f4cf90816b5767f8585d4a08761075af05918e1ba0"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:25:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21, 0x0, 0x0, {0x0, 0x0, 0xffff}}, 0x14}}, 0x0) 08:25:23 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:23 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f00000007c0)='./file0/file1\x00', 0x240880, 0x2d) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000180)='./file0/file1\x00', 0x4000000000a87b, 0x0, 0x0, 0x4, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) setresuid(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000440)='./file0\x00', 0x3, 0x2, &(0x7f0000000480)=[{&(0x7f0000000580)="b93422711dc6f9e73ff3afa39f1bd06b054afbc5d48063400628f6397675f62bc85e4b02c6d890af090f0c94ea731b061228bc4a0eade8fed007515c54f7e9416d7f03ea8baa36d1cf712611e1563b031c6a054ee3a0cb8869286cdf193450ec4774e35d81a2eb23b97e30d59cbd07cfd85473e549f5b2b29f2eb86006361cdea2945bf934218f34b0b91fc0bb3298978b38fee49873277e7b8e1abc290c8e962fdb6f68837063cf43927a9189c5463484df93298785d01f37163b16bf", 0xbd, 0x1}, {&(0x7f0000000640)="0cdcc96fa7d51d52dbb2a2937e33a493f490cdc93932f0129f0413a5521fa030030e0de6fdd5e37f5e441d9c9ca6b83f3656b5105a523c680e879bbf981a3ae285255a601b53980424d2d8202c75c31f506914ff16fed96a98f1873f6610", 0x5e, 0x5}], 0x1000058, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@huge_always}], [{@appraise_type}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_user={'obj_user', 0x3d, '.+{&-'}}, {@fsname={'fsname', 0x3d, '+)[\xe4\xe0{'}}, {@uid_gt}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x65, 0x35, 0x32, 0x35, 0x37, 0x34, 0x66], 0x2d, [0x38, 0x39, 0x66, 0x31], 0x2d, [0x33, 0x61, 0x61, 0x37], 0x2d, [0x38, 0x34, 0x34, 0x34], 0x2d, [0x64, 0x30, 0x61, 0x33, 0x36, 0x30, 0x36, 0x63]}}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 08:25:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) chmod(&(0x7f0000000140)='./file0/file0\x00', 0x2) r0 = syz_io_uring_setup(0x4ee5, &(0x7f0000000080)={0x0, 0x806cad}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x2160}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r5 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_FSYNC={0x3, 0x2, 0x0, @fd=r5, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0) r6 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r6, &(0x7f00000004c0)='./file0\x00', 0x200) pselect6(0x40, &(0x7f00000001c0)={0x15, 0x8, 0xfc, 0x7d46, 0x1c, 0x2, 0x9, 0x1bf}, &(0x7f0000000200)={0x10001, 0x1ff, 0x81, 0x8, 0x1, 0xc3, 0x5, 0x1ff}, &(0x7f0000000240)={0x746, 0x200, 0x0, 0x6, 0x3, 0xad5f, 0x7, 0x6}, &(0x7f0000000280)={0x77359400}, &(0x7f00000003c0)={&(0x7f0000000300)={[0x609e]}, 0x8}) 08:25:23 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000280)='./file0\x00', 0x8, 0x0, 0x0, 0x104020, &(0x7f0000000580)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYRESDEC]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file1\x00', 0x80d80, 0x68) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x102}, 0x0, 0x0, 0x400000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000440)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1ad3000, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:25:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x40030000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:25:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0xf}}, 0x0) [ 3049.788690] cgroup2: Unknown parameter '0xffffffffffffffff0177777777777777777777718446744073709551615' 08:25:24 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3049.818086] cgroup2: Unknown parameter '0xffffffffffffffff0177777777777777777777718446744073709551615' [ 3049.820040] tmpfs: Bad value for 'gid' 08:25:24 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf00000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:25:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x8, 0x103) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000140)="b1fbce02790141cfb084a4c2587567268826a3cc669119b7fdfa3ccb7262c3a5d31f254ba5714a94b274d1f37b815799a1ab4eea6549fd5d449c04f39f477d20530890c3f96026f1f7c7ebb89eeb54b62323488d89a6fa0607d5fb44dfbe9da953654b7fe2e9677b159fbbda4ea2aaa0dd46044148f84bed3d94e89c7e6b429ccb846dd8df7a01f8547d56586137b4873d7e289d717863b745dc2b0e3a5825dd10bafbba3cef3c3edae286bb9d8bbe678baddcbcb5afc1c2d07c588b7ae29fa16cb9ec33c3cb31d317b3e40557f702352916868251c00ac4", 0xd8, 0x81}, {&(0x7f0000000240)="cb31ee92ac6c52fe9226e7c8fab7bcc9ef58dc1f5e685b863e9b714bb053879f0591a10f5eec064e303dafcc538825c5b8082e646958457abdff87a4223a8736008bb15991cb4f1406685ecfb6e2fa58218718788ec0cbb0326a2c", 0x5b, 0x100000000}, {&(0x7f00000000c0)="c5c2b69a7678c89de2e6f30333b22ff71122a259307ac3007410abb5305dbb952f64bf81b07d27ecfe42fe89d1347acde17e944ecb292f634eea7a", 0x3b}, {&(0x7f00000003c0)="d66f22228361d6aa05b6b017953dc3fcf570ee30f21d8424752185d921718ca02671a4df374683221a22dea723d190650ef247f80572de452205ce958b0e01e83859e1a8ba43d4981aaae25f8e3a85f5dc296fba790bab41b1491ecc112b2739e5f68f32929c6b22a267b54d0156e4ab9734f32de4ca9e7dad197a4fa9cbc034d8510e7e9eb76064781136fc17ceb3da2ac53e71edffb79b62d879be44a8e4966716dfe0362d9283cb2e6fceff9ca65d5d085a8091dd6415aa904d3ec4cecf585ce77f782927cb325dbe7190ff197b4e0ff24aa3f59bf1ba97efd2352c3138e0d226fdf3d238679b98d158fdc44caee661b9bd7cf08aafa3161daf1c", 0xfc}], 0x8000, &(0x7f0000000500)={[{@rodir}, {@shortname_mixed}, {@utf8}], [{@uid_lt={'uid<', 0xee01}}, {@audit}]}) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) [ 3049.874416] tmpfs: Unknown parameter '[4!428s'~{) /ohpcCzF4ߓ)7;' 08:25:24 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) r2 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) unlinkat(r1, &(0x7f0000000140)='./file0/file1\x00', 0x200) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:25:24 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) unlinkat(r2, &(0x7f0000000240)='./file0/file1\x00', 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:25:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x10}}, 0x0) 08:25:24 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x116) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="650ee2ffffffad0f9ca876c507d3418e960000e600316d6f24d7241610e5bc493abc5b0000fcff0000"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:25:36 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x8}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:36 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="000000000000000000002ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cbdbf19c3a57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effa76be0", @ANYRES32, @ANYBLOB="650048d2a4a094accae500000000"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:25:36 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240080, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000005c0)=ANY=[@ANYBLOB="0100000001000000b7fd0000", @ANYRES32, @ANYBLOB="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"]) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:25:36 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x4000000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x3a}}, 0x0) 08:25:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f00000000c0)={&(0x7f0000000040)=""/123, 0x7b, 0xa6, 0xb170}) 08:25:36 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) r2 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) unlinkat(r1, &(0x7f0000000140)='./file0/file1\x00', 0x200) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:25:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x100000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:25:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x200000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:25:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x3d}}, 0x0) 08:25:36 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r2 = signalfd4(r0, &(0x7f0000000080)={[0x9]}, 0x8, 0x80800) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x498400, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0xb9d6}}, './file0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd=r1, 0x0, 0x0, 0xfffffff8, 0x4, 0x0, {0x0, 0x0, r1}}, 0xee) 08:25:36 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:36 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x8100000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:36 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) r2 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) unlinkat(r1, &(0x7f0000000140)='./file0/file1\x00', 0x200) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:25:36 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x0, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:25:36 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000240)='./file0\x00', 0x1) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00\x00\x00\x00\x00\x00']) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:25:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x300000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:25:49 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0xc0}}, 0x0) 08:25:49 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') mknod$loop(&(0x7f0000000240)='./file0/file1\x00', 0xc000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:25:49 executing program 5: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:49 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x9effffff00000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x400000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:25:49 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x16aa, 0x4, 0x80000}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000640)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="700000000a000000000000000000d525a32a55c24418c9ac8ca4e81ef6f49b10bc7feb40cb0379e5ee45823e0565a69f7510c571f2bc1d43ca325b71fa9002b2eb9c773c7967a558ea2b20ff09bf2104aadbd7c0a3d480900b3960c0874d036a6cf78c033b6bef37b85104cc6323aa9ef863f313238c18bc1c24d3fb5e981a25ca3dfeff7e596bee2a239e65ad51503c44300c1d6cd6ceaa2b68c1268fb2e5e0e9d7fe55fd4f60d377889254b12e03ddac3afd4039cd49"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:25:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_SEND={0x1a, 0x1, 0x0, r0, 0x0, &(0x7f0000000500)="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", 0x1000, 0x400c0, 0x1, {0x0, r1}}, 0x81) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r2, &(0x7f00000004c0)='./file0\x00', 0x200) [ 3075.427733] cgroup2: Unknown parameter '"Fd{ 8 [ 3075.427733] |x/(?bJj\0T$yK@;}Zwl8k|͗!ZKmXsM?7P%DU0֫)X/s1:sr(Zi>@]/pYTQe0d}M+$D' [ 3075.439442] cgroup2: Unknown parameter '"Fd{ 8 [ 3075.439442] |x/(?bJj\0T$yK@;}Zwl8k|͗!ZKmXsM?7P%DU0֫)X/s1:sr(Zi>@]/pYTQe0d}M+$D' 08:25:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf00000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:25:49 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:25:49 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) (fail_nth: 1) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:25:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0xec0}}, 0x0) 08:25:49 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x1b0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:25:49 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xa001000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x4000000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:05 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x300}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:05 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0/file1\x00', 0x0, 0x0, 0x0, 0xa0000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x9899, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x1fc7, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0x448a80, 0x64) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f0000000440)='./file0/file1\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:26:05 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xc00e000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 1) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:26:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) stat(&(0x7f0000000140)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = getuid() recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000200)=""/248, 0xf8}, {&(0x7f0000000300)=""/2, 0x2}, {0xfffffffffffffffd}, {&(0x7f00000003c0)=""/129, 0x81}, {&(0x7f0000000500)=""/212, 0xd4}, {&(0x7f0000000600)=""/206, 0xce}, {&(0x7f0000000700)=""/255, 0xff}, {&(0x7f0000000800)=""/84, 0x54}], 0x8, &(0x7f0000000900)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}, {{&(0x7f0000000980)=@abs, 0x6e, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/150, 0xfffffffffffffd96}, {&(0x7f0000000480)=""/59, 0x3b}, {&(0x7f0000000ac0)=""/211, 0xe2}], 0x3, &(0x7f0000000c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}}, {{&(0x7f0000000c80), 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000d00)=""/151, 0x97}], 0x1, &(0x7f0000000e00)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}, {{&(0x7f0000000f00), 0x6e, &(0x7f0000002380)=[{&(0x7f0000000f80)=""/69, 0x45}, {&(0x7f0000001000)=""/153, 0x99}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f00000020c0)=""/16, 0x10}, {&(0x7f0000002100)=""/153, 0x99}, {&(0x7f00000021c0)=""/158, 0x9e}, {&(0x7f0000002280)=""/125, 0x7d}, {&(0x7f0000002300)=""/32, 0x20}, {&(0x7f0000002340)=""/30, 0x1e}], 0x9}}, {{&(0x7f0000002440), 0x6e, &(0x7f0000002580)=[{&(0x7f00000024c0)=""/137, 0x89}], 0x1, &(0x7f00000025c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x110}}, {{&(0x7f0000002700)=@abs, 0x6e, &(0x7f0000002880)=[{&(0x7f0000002780)=""/63, 0x3f}, {&(0x7f00000027c0)=""/89, 0x59}, {&(0x7f0000002840)}], 0x3}}, {{0x0, 0x0, &(0x7f0000003bc0)=[{&(0x7f00000028c0)=""/112, 0x70}, {&(0x7f0000002940)=""/141, 0x8d}, {&(0x7f0000002a00)=""/253, 0xfd}, {&(0x7f0000002b00)=""/127, 0x7f}, {&(0x7f0000002b80)=""/4096, 0x1000}, {&(0x7f0000003b80)=""/63, 0x3f}], 0x6}}, {{&(0x7f0000003c40)=@abs, 0x6e, &(0x7f0000005000)=[{&(0x7f0000003cc0)=""/4096, 0x1000}, {&(0x7f0000004cc0)=""/194, 0xc2}, {&(0x7f0000004dc0)=""/215, 0xd7}, {&(0x7f0000004ec0)=""/146, 0x92}, {&(0x7f0000004f80)=""/67, 0x43}], 0x5, &(0x7f0000005080)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005100)=""/216, 0xd8}, {&(0x7f0000005200)=""/112, 0x70}, {&(0x7f0000005280)=""/89, 0x59}, {&(0x7f0000005300)=""/226, 0xe2}, {&(0x7f0000005400)=""/152, 0x98}, {&(0x7f00000054c0)=""/235, 0xeb}, {&(0x7f00000055c0)=""/137, 0x89}, {&(0x7f0000005680)=""/69, 0x45}, {&(0x7f0000005700)=""/157, 0x9d}, {&(0x7f00000057c0)=""/189, 0xbd}], 0xa}}, {{&(0x7f0000005940)=@abs, 0x6e, &(0x7f0000005b80)=[{&(0x7f00000059c0)=""/188, 0xbc}, {&(0x7f0000005a80)=""/229, 0xe5}], 0x2, &(0x7f0000005bc0)=[@cred={{0x1c}}], 0x20}}], 0xa, 0x40000000, &(0x7f0000005e80)={0x77359400}) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x9, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="7a09245485bc8f29a417d022a409cc8d674916492b3e06580b0e69b1d8e95c2470249a3de335065c43cd4302b3a610ef13d2603fcd3cd0d086a8787709be43324e4eeda3067f2459a6ca6a04", 0x4c, 0x3f}, {&(0x7f00000000c0)="bf25bd49dfab4bbc19e816f5a4caa9d4d8f17875", 0x14, 0x7}], 0x4, &(0x7f0000005ec0)={[{}, {'[8@$\'\xe4'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@uid_gt={'uid>', r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vfat\x00'}}, {@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, 'cgroup2\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup2\x00'}}, {@euid_lt={'euid<', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x31a}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) r3 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r3, &(0x7f00000004c0)='./file0\x00', 0x200) 08:26:05 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:26:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x33fe0}}, 0x0) 08:26:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x8100000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x200002d4}}, 0x0) 08:26:05 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xec0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:05 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3091.026164] FAULT_INJECTION: forcing a failure. [ 3091.026164] name failslab, interval 1, probability 0, space 0, times 0 [ 3091.027873] CPU: 1 PID: 14534 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3091.028885] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3091.030049] Call Trace: [ 3091.030426] dump_stack+0x107/0x167 [ 3091.030948] should_fail.cold+0x5/0xa [ 3091.031502] ? getname_flags.part.0+0x50/0x4f0 [ 3091.032136] should_failslab+0x5/0x20 [ 3091.032684] kmem_cache_alloc+0x5b/0x310 [ 3091.033254] getname_flags.part.0+0x50/0x4f0 [ 3091.033865] getname_flags+0x9a/0xe0 [ 3091.034384] do_mkdirat+0x8f/0x2b0 [ 3091.034879] ? user_path_create+0xf0/0xf0 [ 3091.035458] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3091.036187] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3091.036915] do_syscall_64+0x33/0x40 [ 3091.037432] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3091.038140] RIP: 0033:0x7fe296c58b19 [ 3091.038653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3091.041233] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3091.042292] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3091.043276] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3091.044260] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3091.045252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3091.046243] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:26:05 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:26:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0/file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000180)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001c80)={[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='pstore\x00', 0x1800006, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) socketpair(0x9, 0x1, 0x402, &(0x7f0000000080)={0xffffffffffffffff}) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000001500)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x10000000c) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f0000000640)=ANY=[@ANYBLOB]) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_setup(0x4898, &(0x7f0000000240)={0x0, 0xa092, 0x10, 0x2, 0x52, 0x0, r3}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140)=0x0, &(0x7f00000001c0)) syz_io_uring_submit(r6, 0x0, &(0x7f0000000300)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)="037ec052eb7052ecc311eb97be349b472124662ef4dede168d2cc6b84523e469f7de3551a997ff1a436a6a460d6c7b3b654058217932b9b4e725b61005069a94b0023b61ffa96663ecdf9beb68cbd35d7220f33536b1ffa44c6249741c19fb3b87fc119879864c8fd9e2289f682666006227", 0x72, 0x40, 0x0, {0x0, r5}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000640)=ANY=[@ANYBLOB]) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)="037ec052eb7052ecc311eb97be349b472124662ef4dede168d2cc6b84523e469f7de3551a997ff1a436a6a460d6c7b3b654058217932b9b4e725b61005069a94b0023b61ffa96663ecdf9beb68cbd35d7220f33536b1ffa44c6249741c19fb3b87fc119879864c8fd9e2289f682666006227", 0x72, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f0000000540)=@IORING_OP_POLL_REMOVE={0x7, 0x2, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1, {0x0, r7}}, 0x40) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x3cf50e32ce83716e, 0x21) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd=r1, 0x4, 0x0, 0x9, 0x0, 0x0, {0x0, r5}}, 0x2) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:26:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x7ffff000}}, 0x0) [ 3091.105186] SELinux: duplicate or incompatible mount options 08:26:05 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x44082, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:26:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x9effffff00000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0xfffffdef}}, 0x0) [ 3091.202065] SELinux: duplicate or incompatible mount options 08:26:17 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf00}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 2) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:26:17 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x8}, 0x0) 08:26:17 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f0000000140)='./file0/file1\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB="65810000000000000001b3408600"]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f0000000440)='./file0\x00', 0x28) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:26:17 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x2, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:26:17 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xa701000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:17 executing program 4: r0 = shmget(0x0, 0x1000, 0x1, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x2000) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) chroot(&(0x7f0000000040)='./file1\x00') r2 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) r3 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYRES32=0x0, @ANYRES32, @ANYRESHEX=r1, @ANYRESDEC=r2]) unlinkat(r3, &(0x7f00000004c0)='./file0\x00', 0x200) r4 = shmget$private(0x0, 0x1000, 0x1c10, &(0x7f0000ffd000/0x1000)=nil) shmat(r4, &(0x7f0000800000/0x800000)=nil, 0xc000) shmctl$IPC_RMID(r4, 0x0) [ 3102.846817] cgroup2: Unknown parameter '' [ 3102.876554] cgroup2: Unknown parameter '' [ 3102.898538] FAULT_INJECTION: forcing a failure. [ 3102.898538] name failslab, interval 1, probability 0, space 0, times 0 [ 3102.901504] CPU: 0 PID: 14587 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3102.903233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3102.905325] Call Trace: [ 3102.905987] dump_stack+0x107/0x167 [ 3102.906909] should_fail.cold+0x5/0xa [ 3102.907873] ? create_object.isra.0+0x3a/0xa20 [ 3102.909037] should_failslab+0x5/0x20 [ 3102.909992] kmem_cache_alloc+0x5b/0x310 [ 3102.911008] ? ksys_write+0x21a/0x260 [ 3102.911966] create_object.isra.0+0x3a/0xa20 [ 3102.913080] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3102.914357] kmem_cache_alloc+0x159/0x310 [ 3102.915401] getname_flags.part.0+0x50/0x4f0 [ 3102.916528] getname_flags+0x9a/0xe0 [ 3102.917444] do_mkdirat+0x8f/0x2b0 [ 3102.918292] ? user_path_create+0xf0/0xf0 [ 3102.919335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3102.920653] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3102.921898] do_syscall_64+0x33/0x40 [ 3102.922813] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3102.924053] RIP: 0033:0x7fe296c58b19 [ 3102.924958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3102.929576] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3102.931486] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3102.933272] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3102.934994] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3102.936725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3102.938511] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:26:17 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:17 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x3d}, 0x0) 08:26:17 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xc00e000000000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 08:26:17 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:26:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x300}, 0x0) 08:26:17 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 3) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:26:30 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x8100}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x2}, 0x0) 08:26:30 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:26:30 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='omfs\x00', 0x8040, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r2, &(0x7f00000004c0)='./file0\x00', 0x200) 08:26:30 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:30 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x44ec, 0x6}, 0x20, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) [ 3116.499187] FAULT_INJECTION: forcing a failure. [ 3116.499187] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3116.502283] CPU: 1 PID: 14642 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3116.503917] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3116.505862] Call Trace: [ 3116.506475] dump_stack+0x107/0x167 [ 3116.507326] should_fail.cold+0x5/0xa [ 3116.508216] strncpy_from_user+0x34/0x470 [ 3116.509195] getname_flags.part.0+0x95/0x4f0 [ 3116.510235] getname_flags+0x9a/0xe0 [ 3116.511105] do_mkdirat+0x8f/0x2b0 [ 3116.511931] ? user_path_create+0xf0/0xf0 [ 3116.512916] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3116.514137] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3116.515363] do_syscall_64+0x33/0x40 [ 3116.516247] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3116.517471] RIP: 0033:0x7fe296c58b19 [ 3116.518352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3116.522661] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3116.524425] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3116.526083] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3116.527728] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3116.529372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3116.531002] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:26:30 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:30 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x8, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:26:30 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xb001}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x8}, 0x0) 08:26:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 4) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:26:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x44040, 0x0) unlinkat(r1, &(0x7f00000000c0)='./file0/file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2a400, 0x4) 08:26:30 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xc00e}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:30 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f0000000440)={0x0, 0x19e9, 0x2, 0x80004}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000002000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYRESHEX=r2, @ANYRES32, @ANYRES64=r2]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000003c0)='./file0/file1\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:26:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xf}, 0x0) [ 3116.816502] FAULT_INJECTION: forcing a failure. [ 3116.816502] name failslab, interval 1, probability 0, space 0, times 0 [ 3116.819675] CPU: 0 PID: 14671 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3116.821156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3116.822936] Call Trace: [ 3116.823513] dump_stack+0x107/0x167 [ 3116.824296] should_fail.cold+0x5/0xa [ 3116.825131] ? __d_alloc+0x2a/0x990 [ 3116.825906] should_failslab+0x5/0x20 [ 3116.826710] kmem_cache_alloc+0x5b/0x310 [ 3116.827566] ? __d_lookup+0x3bf/0x760 [ 3116.828368] __d_alloc+0x2a/0x990 [ 3116.829112] d_alloc+0x46/0x1c0 [ 3116.829808] __lookup_hash+0xcc/0x190 [ 3116.830629] filename_create+0x186/0x4a0 [ 3116.831506] ? filename_parentat+0x570/0x570 [ 3116.832447] ? getname_flags.part.0+0x1dd/0x4f0 [ 3116.833460] do_mkdirat+0xa2/0x2b0 [ 3116.834222] ? user_path_create+0xf0/0xf0 [ 3116.835124] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3116.836250] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3116.837364] do_syscall_64+0x33/0x40 [ 3116.838166] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3116.839264] RIP: 0033:0x7fe296c58b19 [ 3116.840058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3116.843990] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3116.845606] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3116.847136] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3116.848681] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3116.850203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3116.851748] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:26:46 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:46 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x10004147, &(0x7f00000003c0)={0x0, 0x5709, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYRESHEX=r1, @ANYRES32, @ANYBLOB='e\x00'/14]) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x188) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xf0}, 0x0) 08:26:46 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 5) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:26:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) syz_io_uring_setup(0x4ee5, &(0x7f0000000080)={0x0, 0x806cad}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x2160}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) r5 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000001500)=ANY=[]) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x1, 0x6, &(0x7f0000001900)=[{&(0x7f0000001640)="0a0980fbc855d551cc3fed94451413546133f2e2dd3542155aaa22ce652ccc3ae54f61f4c9ac50656fa85a2854117f2650479ea32969062cc27aa5752996652daebf22750d1419bb318623e39038c832114d31fe84868455de6067379d3d638d720f4dd7bde7e4c6b67668c131d331ca89ba99f5de5767e19d1465331ca2a1fc1e63a790ffa6f1c4f4758de41304e3abb6cfdebcac211549deeabb5a4f7332e8eb99aee5b87ac9c7137cd225ab4fda250ce29347d0660403e4249ba114c82e7afe1f0729501aba52fba2cf1128ad55891bdbb2ebd4f7b7071cece00826c632eb7e6c01d5e5e118effcea6b80ed5e5770", 0xf0, 0x4815a07}, {&(0x7f0000001740)="a134e5b1a7c9a16e8590b8db3f09abc63f57f67ace8b153d7c2c1fb8057ce66c04f1359c9214e85cd9312a64b3951f40eeb18830ec96d985282945c2ca8fefc9dd9dd1330e1f9edc54e06ea804abf883c29df62258cc5a180388000c4527b08670c138f9803bd8bab997ee5c51f0df67b86de7400ad9d495908426ab3b7f6a0bef5bcaa149bb86493c38d94a14070f36793d1513afd2b264927cf5b47d2342970c7f0b640abddb2a88e22c9ce15768a9fe8b06b6925b5f70be30e1b28a0d570db1", 0xc1, 0x3}, {&(0x7f00000014c0)="5f0a6f5765f6b0ee45f5d7aec1a6fcf12562b8813a272b1d33051b749be31ad7d71dc0a8bc057c744df2b20514295144b655ff7c0d3b72367583f9e765faf906c2eb1f745bc2288490a16aa1dfd9aa4c86586d452f559fbc0a661d789342eef39fb63a7b72d3d6e1fdb03b6160d93fe1602f792b67e2b8abb7f4785f3c37461a0e2cc5cc0e89200678bcdd18a6f01afbe22ea4545542ee", 0x97, 0x2f}, {&(0x7f00000003c0)="e0595d51d9851445cb84d48c5ab32ebb98efd903b7fb12aecde53921265a3bc95e3cd48b1be3da925f01dbf1f191592973a63f050c8ead84600fa243c16ef52772a796b1e60347262744483d7558eedaae0e66817b", 0x55, 0x80000000}, {&(0x7f0000001840)="a9372ea514a7690076193f842fe93cbfc06276b77151f57a5ce40ae796d3cc254e8cf0cc547d75b0b40f3038e9c72a6ac1d783f9330a86a7c0d7c3c0259af1add836fc311ec6908a0e98e2c45d1ef4488e41d729ef2359805ec99859d0e4a0fee0d39ca012c041d224b0e4b7bca7946ef5dac7966e41975fb4df07c3e227e0cddb15c742486828514e3898154ce84ac017af92db8fd3cd304bc13a5e6e84e2475f", 0xa1, 0x1a}, {&(0x7f00000002c0)="ee32d03772439ec982001163cec0f21937012166a1421007ecc3538c99d63c005f551526b800e063f2a4ff9e1b", 0x2d, 0x3}], 0x2082818, &(0x7f00000019c0)={[{@utf8no}, {@shortname_mixed}, {@utf8no}, {@numtail}, {@shortname_mixed}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) r6 = openat(r5, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) getpeername$packet(r6, &(0x7f0000000140), &(0x7f00000001c0)=0x14) r7 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000000c) ioctl$AUTOFS_DEV_IOCTL_VERSION(r7, 0xc0189371, &(0x7f0000001a40)=ANY=[@ANYBLOB="65750a2679a5c308fc9a4f01855804b1d52220fb45a67f89e109e580d2a0b747c08f3c9cf384069549b9af951462ee51be62ca77b7f6506406db6be3a8d4e898c0960178614660e0ee4b4780541a096ea3be6f07918b9cf006"]) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)="037ec052eb7052ecc311eb97be349b472124662ef4dede168d2cc6b84523e469f7de3551a997ff1a436a6a460d6c7b3b654058217932b9b4e725b61005069a94b0023b61ffa96663ecdf9beb68cbd35d7220f33536b1ffa44c6249741c19fb3b87fc119879864c8fd9e2289f682666006227", 0x72, 0x0, 0x0, {0x0, r8}}, 0x1) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r4, 0x10001, 0x0, 0x7, 0x0, 0x1, {0x0, r8}}, 0x5a) 08:26:46 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xf, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) [ 3132.184533] FAULT_INJECTION: forcing a failure. [ 3132.184533] name failslab, interval 1, probability 0, space 0, times 0 [ 3132.187385] CPU: 1 PID: 14710 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3132.188963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3132.190839] Call Trace: [ 3132.191439] dump_stack+0x107/0x167 [ 3132.192265] should_fail.cold+0x5/0xa [ 3132.193138] ? create_object.isra.0+0x3a/0xa20 [ 3132.194172] should_failslab+0x5/0x20 [ 3132.195031] kmem_cache_alloc+0x5b/0x310 [ 3132.195945] create_object.isra.0+0x3a/0xa20 [ 3132.196928] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3132.198061] kmem_cache_alloc+0x159/0x310 [ 3132.198977] ? __d_lookup+0x3bf/0x760 [ 3132.199826] __d_alloc+0x2a/0x990 [ 3132.200602] d_alloc+0x46/0x1c0 [ 3132.201391] __lookup_hash+0xcc/0x190 [ 3132.202243] filename_create+0x186/0x4a0 [ 3132.203147] ? filename_parentat+0x570/0x570 [ 3132.204123] ? getname_flags.part.0+0x1dd/0x4f0 [ 3132.205171] do_mkdirat+0xa2/0x2b0 [ 3132.205963] ? user_path_create+0xf0/0xf0 [ 3132.206896] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3132.208061] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3132.209217] do_syscall_64+0x33/0x40 [ 3132.210044] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3132.211203] RIP: 0033:0x7fe296c58b19 [ 3132.212032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3132.216115] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3132.217800] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3132.219378] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3132.220961] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3132.222533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3132.224108] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x29a}, 0x0) 08:26:46 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x34000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:46 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xf0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:26:46 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x8}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:46 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x80000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xf00}, 0x0) 08:26:46 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x8100}, 0x0) 08:26:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:46 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf0}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:46 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x400300}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 6) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 3132.508395] FAULT_INJECTION: forcing a failure. [ 3132.508395] name failslab, interval 1, probability 0, space 0, times 0 [ 3132.510156] CPU: 0 PID: 14759 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3132.511084] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3132.512208] Call Trace: [ 3132.512574] dump_stack+0x107/0x167 [ 3132.513088] should_fail.cold+0x5/0xa [ 3132.513617] ? cgroup_mkdir+0x251/0xf50 [ 3132.514158] should_failslab+0x5/0x20 [ 3132.514667] __kmalloc+0x72/0x390 [ 3132.515134] cgroup_mkdir+0x251/0xf50 [ 3132.515646] ? cgroup_destroy_locked+0x710/0x710 [ 3132.516278] kernfs_iop_mkdir+0x14d/0x1e0 [ 3132.516836] vfs_mkdir+0x493/0x750 [ 3132.517309] do_mkdirat+0x150/0x2b0 [ 3132.517791] ? user_path_create+0xf0/0xf0 [ 3132.518342] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3132.519036] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3132.519721] do_syscall_64+0x33/0x40 [ 3132.520215] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3132.520902] RIP: 0033:0x7fe296c58b19 [ 3132.521393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3132.523828] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3132.524833] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3132.525775] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3132.526720] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3132.527653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3132.528594] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:26:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 7) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:26:58 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x9a02}, 0x0) 08:26:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x27cb, &(0x7f0000000080)={0x0, 0x806cae, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r2, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x2160}, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000040), 0x6e, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/51, 0x33}, {&(0x7f0000000140)=""/91, 0x5b}, {&(0x7f00000001c0)=""/117, 0x75}, {&(0x7f0000000240)=""/177, 0xb1}, {&(0x7f0000000300)=""/3, 0x3}], 0x5, &(0x7f0000000500)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000440)=""/110, 0x6e}, {&(0x7f00000005c0)=""/156, 0x9c}, {&(0x7f0000000680)=""/36, 0x24}], 0x3, &(0x7f0000000700)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x108}}, {{&(0x7f0000000840), 0x6e, &(0x7f0000000a40)=[{&(0x7f00000008c0)=""/180, 0xb4}, {&(0x7f0000000980)=""/57, 0x39}, {&(0x7f00000009c0)=""/74, 0x4a}], 0x3}}, {{&(0x7f0000000a80), 0x6e, &(0x7f0000000cc0)=[{&(0x7f0000000b00)=""/14, 0xe}, {&(0x7f0000000b40)=""/85, 0x55}, {&(0x7f0000000bc0)=""/215, 0xd7}], 0x3, &(0x7f0000000d00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{&(0x7f0000000d80)=@abs, 0x6e, &(0x7f0000002000)=[{&(0x7f0000000e00)=""/66, 0x42}, {&(0x7f0000000e80)=""/132, 0x84}, {&(0x7f0000000f40)=""/178, 0xb2}, {&(0x7f0000001000)=""/4096, 0x1000}], 0x4}}], 0x5, 0x0, &(0x7f0000002180)={0x77359400}) syz_io_uring_submit(r0, 0x0, &(0x7f00000021c0)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r3, 0x0, 0x0, 0x0, 0x1}, 0x3ff) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r4, &(0x7f00000004c0)='./file0\x00', 0x200) 08:26:58 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r2 = syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x62b2, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xc, 0xffffffffffffffff, 0x12) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYRES16, @ANYRES32, @ANYBLOB="65000000000000000000e0ffffff"]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000440), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000580)=ANY=[@ANYRESDEC, @ANYRESHEX, @ANYRESDEC=r2, @ANYRESHEX=r0, @ANYRES16=r1]) symlinkat(0x0, r0, &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x8c040, 0x78) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) 08:26:58 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x300, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:26:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:58 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x1a0}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xf000}, 0x0) [ 3144.028590] FAULT_INJECTION: forcing a failure. [ 3144.028590] name failslab, interval 1, probability 0, space 0, times 0 [ 3144.032303] CPU: 1 PID: 14770 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3144.033832] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3144.035648] Call Trace: [ 3144.036235] dump_stack+0x107/0x167 [ 3144.037044] should_fail.cold+0x5/0xa [ 3144.037882] ? create_object.isra.0+0x3a/0xa20 [ 3144.038878] should_failslab+0x5/0x20 [ 3144.039712] kmem_cache_alloc+0x5b/0x310 [ 3144.040607] create_object.isra.0+0x3a/0xa20 [ 3144.041577] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3144.042693] kmem_cache_alloc+0x159/0x310 [ 3144.043606] alloc_inode+0x171/0x240 [ 3144.044415] iget_locked+0x1ae/0x6a0 [ 3144.045241] kernfs_get_inode+0x47/0x520 [ 3144.046132] kernfs_iop_lookup+0x194/0x220 [ 3144.047060] __lookup_hash+0x121/0x190 [ 3144.047914] filename_create+0x186/0x4a0 [ 3144.048803] ? filename_parentat+0x570/0x570 [ 3144.049778] ? getname_flags.part.0+0x1dd/0x4f0 [ 3144.050808] do_mkdirat+0xa2/0x2b0 08:26:58 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x40c, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) [ 3144.051584] ? user_path_create+0xf0/0xf0 [ 3144.052677] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3144.053806] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3144.054897] do_syscall_64+0x33/0x40 [ 3144.055681] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3144.056745] RIP: 0033:0x7fe296c58b19 08:26:58 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x300}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3144.057529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3144.061495] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3144.063090] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3144.064576] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3144.066068] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 08:26:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x34000}, 0x0) [ 3144.067552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3144.069163] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:26:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x8}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:26:58 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:26:58 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x1004000, 0x0) mknodat$null(r0, &(0x7f0000000040)='./file0\x00', 0x10, 0x103) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) 08:26:58 executing program 1: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0xa001000000000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:27:09 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)={{r2, r3/1000+10000}, {0x0, 0xea60}}) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) 08:27:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0xca}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r2 = perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x3) r3 = signalfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000d1dc2c836ab94694a3aebab58b919669612c734ec1e649faa39043e684fe44afa99cb478c1768da81796", @ANYBLOB="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"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f000004cc80)={{0x0, 0x2, 0xfffffffffffffff9, 0x6d, 0xa6, 0x0, 0x4e4, 0xe49f, 0x4, 0x7fffffff, 0x5, 0x2, 0xe6b, 0x0, 0x20}}) copy_file_range(0xffffffffffffffff, &(0x7f0000000300)=0x81, r3, &(0x7f0000000380)=0x40, 0x7, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {r8}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}], 0x0, "46da9200"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f000004dc80)) lseek(r1, 0x0, 0x2) lseek(r0, 0x14, 0x2) r13 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x128) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000340)=0x8) copy_file_range(r13, 0x0, r1, 0x0, 0x200f5ef, 0x0) 08:27:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 8) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:27:09 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xc04, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:27:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:27:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x80000}, 0x0) 08:27:09 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xec0}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:27:09 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:27:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x400300}, 0x0) [ 3155.210596] FAULT_INJECTION: forcing a failure. [ 3155.210596] name failslab, interval 1, probability 0, space 0, times 0 [ 3155.212410] CPU: 1 PID: 14839 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3155.213367] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3155.214346] Call Trace: [ 3155.214668] dump_stack+0x107/0x167 [ 3155.215102] should_fail.cold+0x5/0xa [ 3155.215563] ? create_object.isra.0+0x3a/0xa20 [ 3155.216091] should_failslab+0x5/0x20 [ 3155.216543] kmem_cache_alloc+0x5b/0x310 [ 3155.217022] create_object.isra.0+0x3a/0xa20 [ 3155.217541] kmemleak_alloc_percpu+0xa0/0x100 [ 3155.218065] pcpu_alloc+0x4e2/0x1240 [ 3155.218513] ? cset_cgroup_from_root+0x220/0x220 [ 3155.219060] percpu_ref_init+0x31/0x3d0 [ 3155.219527] cgroup_mkdir+0x288/0xf50 [ 3155.219971] ? cgroup_destroy_locked+0x710/0x710 [ 3155.220534] kernfs_iop_mkdir+0x14d/0x1e0 [ 3155.221026] vfs_mkdir+0x493/0x750 [ 3155.221446] do_mkdirat+0x150/0x2b0 [ 3155.221866] ? user_path_create+0xf0/0xf0 [ 3155.222354] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3155.222956] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3155.223555] do_syscall_64+0x33/0x40 [ 3155.223992] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3155.224595] RIP: 0033:0x7fe296c58b19 [ 3155.225032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3155.227165] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3155.228047] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3155.228882] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3155.229726] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3155.230550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3155.231382] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:27:09 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xec0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:27:21 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf00}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:27:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='ext4\x00', 0x42020, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:27:21 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11102, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180)={0x0, 0xc3de, 0x2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080), 0x4) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) dup3(r3, r4, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca", 0x1a}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c8d, 0x4e98, 0x3, &(0x7f0000000080)={[0x45c1]}, 0x8) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r6, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x4}, 0xff) syz_io_uring_submit(r5, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:27:21 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xf00, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:27:21 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:27:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xf0ffff}, 0x0) 08:27:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 9) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:27:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf0}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 3167.075420] FAULT_INJECTION: forcing a failure. [ 3167.075420] name failslab, interval 1, probability 0, space 0, times 0 [ 3167.078320] CPU: 1 PID: 14874 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3167.079930] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3167.081875] Call Trace: [ 3167.082493] dump_stack+0x107/0x167 [ 3167.083345] should_fail.cold+0x5/0xa [ 3167.084230] ? create_object.isra.0+0x3a/0xa20 [ 3167.085310] should_failslab+0x5/0x20 [ 3167.086197] kmem_cache_alloc+0x5b/0x310 [ 3167.087144] ? mark_held_locks+0x9e/0xe0 [ 3167.088094] create_object.isra.0+0x3a/0xa20 [ 3167.089136] kmemleak_alloc_percpu+0xa0/0x100 [ 3167.090185] pcpu_alloc+0x4e2/0x1240 [ 3167.091072] ? cset_cgroup_from_root+0x220/0x220 [ 3167.092177] percpu_ref_init+0x31/0x3d0 [ 3167.093112] cgroup_mkdir+0x288/0xf50 [ 3167.094004] ? cgroup_destroy_locked+0x710/0x710 [ 3167.095104] kernfs_iop_mkdir+0x14d/0x1e0 [ 3167.096067] vfs_mkdir+0x493/0x750 [ 3167.096892] do_mkdirat+0x150/0x2b0 [ 3167.097749] ? user_path_create+0xf0/0xf0 [ 3167.098715] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3167.099934] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3167.101147] do_syscall_64+0x33/0x40 [ 3167.102015] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3167.103203] RIP: 0033:0x7fe296c58b19 [ 3167.104066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3167.108359] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3167.110127] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3167.111775] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3167.113431] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3167.115080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3167.116728] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:27:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x1a7}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:27:21 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x4000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:27:21 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:27:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r2 = creat(&(0x7f0000000000)='./file2\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) creat(&(0x7f00000000c0)='./file2\x00', 0x2) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="34010000000000000000fe8800000000000000000000000000010000000000000000e00000010000000000000000000000007f000001000000000000000000000000fc00000000000000000000000000000000000000000000000000040062000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="200100000000000000000000000000027f00000100000000000000000000000000000000000000000a00000067000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="00000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000a3ba8daa58a073000000000000000c0008000800080000000000308908b796afc0c5a68f784213bf66e0584c8de464141f759353c56c3ed0d8b5eaf5a43a00cef090b33b0a7b849b0b25c657c5f090ffde677ab0a467d9ea4f8c69c5be2dee1bf9eace443c4db01bc65b98754015960ea4ecac8ea5bfa43d1d15"], 0x134}}, 0x0) close(r2) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x200000a, 0x13, 0xffffffffffffffff, 0x0) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x5, 0x4004, @fd_index=0x4, 0x8000000103, &(0x7f0000000600)}, 0x5) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)=0x1) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x5000)=nil, 0x5000, 0x4, 0xabe023afc5a1eeb9, r2, 0x10000000) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000100)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file2\x00', 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x2) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) copy_file_range(r5, 0x0, r1, 0x0, 0x200f5ef, 0x0) 08:27:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x1000000}, 0x0) 08:27:21 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200000, 0x14) [ 3167.180202] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=14887 comm=syz-executor.1 08:27:21 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3167.247771] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=14887 comm=syz-executor.1 08:27:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 10) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:27:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x2000000}, 0x0) 08:27:34 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = mq_open(&(0x7f0000000080)='+^]+[%\x00', 0x2, 0x8, &(0x7f00000000c0)={0x7, 0x80000000, 0xfa9, 0x1ff}) stat(&(0x7f0000000140)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) r4 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb357b87ae67d5b00d5a28eea29113393d0e1c7391515c7ab7c00", 0x2d}, 0x48, 0xffffffffffffffff) r5 = getegid() keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000300)=@keyring={'key_or_keyring:', r4}) keyctl$chown(0x4, r4, 0xee01, r5) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {r2, r5}}, './file0\x00'}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) setresgid(r3, r6, r3) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) 08:27:34 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:27:34 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x8100, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:27:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x300}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 3179.965228] FAULT_INJECTION: forcing a failure. [ 3179.965228] name failslab, interval 1, probability 0, space 0, times 0 08:27:34 executing program 1: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @empty}, &(0x7f0000000200)=0xc) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file2\x00', 0x40, 0x3) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f00000035c0)=[{{&(0x7f0000000000)={0x2, 0x4e20, @private=0xa010102}, 0x10, 0x0}}, {{&(0x7f0000001140)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f00000015c0)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @multicast1, @local}}}], 0x20}}], 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x10800, 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') readv(r2, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40086607, &(0x7f0000000080)={0x0, 0xfffffffffffffffd}) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001900)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x4, @inherit={0x60, &(0x7f0000000140)=ANY=[@ANYBLOB="0101000000000000030000f30000e1000500002e00000000040000fffffffc008180000000000002ffffffff000400000000000002000000ea54ffff210005000100000000250000000000000000e6ff5709e8a94a0000"]}, @devid=r5}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000900)={0x2, 0x0, {0x1f, @struct={0x5, 0x3}, 0x0, 0xffffffffffffffff, 0xbe5, 0x2, 0x81, 0xffff, 0x448, @struct={0x917, 0x1ff}, 0x6, 0xb679, [0x5, 0x40000000000000, 0x5, 0x101, 0x6, 0x80000001]}, {0x1f, @usage=0x800, 0x0, 0x1, 0x8, 0x100000001, 0x14da6866, 0x0, 0x7, @usage=0x2, 0x2, 0x8, [0x7ff, 0x8, 0x5, 0x4, 0x8, 0x4]}, {0x1fb, @usage, r5, 0xffff, 0x1, 0x917, 0x1ff, 0x7fffffff, 0x24, @struct={0x7f, 0x9}, 0xe8, 0x400, [0x1, 0x6, 0x7, 0x1, 0x2, 0x1]}, {0x2, 0x7ff, 0x100000001}}) 08:27:34 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x8100}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3179.967846] CPU: 1 PID: 14914 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3179.969515] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3179.971291] Call Trace: [ 3179.971852] dump_stack+0x107/0x167 [ 3179.972635] should_fail.cold+0x5/0xa [ 3179.973486] ? percpu_ref_init+0xd8/0x3d0 [ 3179.974377] should_failslab+0x5/0x20 [ 3179.975195] kmem_cache_alloc_trace+0x55/0x320 [ 3179.976184] ? cset_cgroup_from_root+0x220/0x220 [ 3179.977216] percpu_ref_init+0xd8/0x3d0 [ 3179.978090] cgroup_mkdir+0x288/0xf50 [ 3179.978903] ? cgroup_destroy_locked+0x710/0x710 [ 3179.979913] kernfs_iop_mkdir+0x14d/0x1e0 [ 3179.980806] vfs_mkdir+0x493/0x750 [ 3179.981606] do_mkdirat+0x150/0x2b0 [ 3179.982397] ? user_path_create+0xf0/0xf0 [ 3179.983298] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3179.984412] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3179.985541] do_syscall_64+0x33/0x40 [ 3179.986344] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3179.987437] RIP: 0033:0x7fe296c58b19 [ 3179.988232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3179.992165] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3179.993809] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3179.995344] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3179.996858] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3179.998420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3179.999937] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:27:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x1000001, &(0x7f0000000140)='cgroup2\x00') mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:27:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xf000000}, 0x0) 08:27:34 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xc00e, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:27:34 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:27:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xec0}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:27:50 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:27:50 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xf000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:27:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000000c0)="a3", 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffff9, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="05d0f4f8ffb051f3b807407d664915e13b13ac6107462f7c8b7a44c225a91d30c6e6927def9147fe66461ab324957da126db740d543d633109628194762d095c6de35c0a39ac52b1e33759f4df9c8ac57ca58e873d80e088ecc25d3e04bd135d9e38d9bcf583d2e88d4a", 0x6a, 0x6}], 0x5000, &(0x7f0000000240)={[{@shortname_lower}, {@numtail}, {@nonumtail}, {@uni_xlateno}, {@fat=@umask={'umask', 0x3d, 0x8000}}, {@numtail}], [{@seclabel}, {@appraise_type}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x6c2603, 0x19a) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) dup2(r2, r1) 08:27:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 11) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:27:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x81000000}, 0x0) 08:27:50 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf00}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:27:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) 08:27:50 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xa001}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:27:50 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x34000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:27:50 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:27:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x9a020000}, 0x0) 08:27:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) [ 3196.003172] FAULT_INJECTION: forcing a failure. [ 3196.003172] name failslab, interval 1, probability 0, space 0, times 0 [ 3196.004560] CPU: 0 PID: 14956 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3196.005343] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3196.006297] Call Trace: [ 3196.006603] dump_stack+0x107/0x167 [ 3196.007020] should_fail.cold+0x5/0xa [ 3196.007462] ? create_object.isra.0+0x3a/0xa20 [ 3196.007986] should_failslab+0x5/0x20 [ 3196.008417] kmem_cache_alloc+0x5b/0x310 [ 3196.008885] create_object.isra.0+0x3a/0xa20 [ 3196.009392] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3196.010004] kmem_cache_alloc_trace+0x151/0x320 [ 3196.010545] ? cset_cgroup_from_root+0x220/0x220 [ 3196.011084] percpu_ref_init+0xd8/0x3d0 [ 3196.011539] cgroup_mkdir+0x288/0xf50 [ 3196.011975] ? cgroup_destroy_locked+0x710/0x710 [ 3196.012514] kernfs_iop_mkdir+0x14d/0x1e0 08:27:50 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 3196.012987] vfs_mkdir+0x493/0x750 [ 3196.013559] do_mkdirat+0x150/0x2b0 [ 3196.013975] ? user_path_create+0xf0/0xf0 [ 3196.014450] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3196.015046] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3196.015635] do_syscall_64+0x33/0x40 [ 3196.016059] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3196.016644] RIP: 0033:0x7fe296c58b19 [ 3196.017068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3196.019164] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3196.020027] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3196.020832] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3196.021650] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3196.022454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3196.023261] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 [ 3196.037140] loop1: detected capacity change from 0 to 135266304 08:27:50 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x80000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:27:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 12) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:27:50 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x400300, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:27:50 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x8100}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 3196.128534] loop1: detected capacity change from 0 to 135266304 08:27:50 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xc00e}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3196.138134] FAULT_INJECTION: forcing a failure. [ 3196.138134] name failslab, interval 1, probability 0, space 0, times 0 [ 3196.139615] CPU: 0 PID: 14997 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3196.140403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3196.141345] Call Trace: [ 3196.141676] dump_stack+0x107/0x167 [ 3196.142093] should_fail.cold+0x5/0xa [ 3196.142528] ? create_object.isra.0+0x3a/0xa20 [ 3196.143052] should_failslab+0x5/0x20 [ 3196.143492] kmem_cache_alloc+0x5b/0x310 [ 3196.143957] create_object.isra.0+0x3a/0xa20 [ 3196.144471] kmemleak_alloc_percpu+0xa0/0x100 [ 3196.144983] pcpu_alloc+0x4e2/0x1240 [ 3196.145431] cgroup_rstat_init+0x14f/0x1f0 [ 3196.145916] cgroup_mkdir+0x706/0xf50 [ 3196.146355] ? cgroup_destroy_locked+0x710/0x710 [ 3196.146891] kernfs_iop_mkdir+0x14d/0x1e0 [ 3196.147368] vfs_mkdir+0x493/0x750 [ 3196.147772] do_mkdirat+0x150/0x2b0 [ 3196.148188] ? user_path_create+0xf0/0xf0 [ 3196.148664] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3196.149261] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3196.149857] do_syscall_64+0x33/0x40 [ 3196.150283] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3196.150866] RIP: 0033:0x7fe296c58b19 [ 3196.151289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3196.153385] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3196.154252] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3196.155064] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3196.155873] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3196.156684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3196.157507] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:28:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x9effffff}, 0x0) 08:28:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xa701}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:28:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 13) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:28:02 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xb0010000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:02 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:02 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x8c01}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x1, r0, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r1 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) mremap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x1000, 0x4, &(0x7f0000ffe000/0x1000)=nil) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000000, r1) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) munlock(&(0x7f0000ffa000/0x1000)=nil, 0x1000) 08:28:02 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xf0ffff, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:28:02 executing program 4: sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x1c, 0x17, {0x14, 0x1, @l2={'eth', 0x3a, 'ip6gretap0\x00'}}}}, ["", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x800) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x1) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08012bbd7000bd337d8a2e236cfc6b6f7b98861dabfd0000001e50141c6b000100f9ff050100000005002900000000000500370000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4a050}, 0x10) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x1, 0x0, 0x1}, 0x3) [ 3208.794309] FAULT_INJECTION: forcing a failure. [ 3208.794309] name failslab, interval 1, probability 0, space 0, times 0 [ 3208.795663] CPU: 0 PID: 15020 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3208.796445] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3208.797385] Call Trace: [ 3208.797701] dump_stack+0x107/0x167 [ 3208.798118] should_fail.cold+0x5/0xa [ 3208.798551] ? create_object.isra.0+0x3a/0xa20 [ 3208.799071] should_failslab+0x5/0x20 [ 3208.799503] kmem_cache_alloc+0x5b/0x310 [ 3208.799965] ? mark_held_locks+0x9e/0xe0 [ 3208.800427] create_object.isra.0+0x3a/0xa20 [ 3208.800933] kmemleak_alloc_percpu+0xa0/0x100 [ 3208.801449] pcpu_alloc+0x4e2/0x1240 [ 3208.801889] cgroup_rstat_init+0x14f/0x1f0 [ 3208.802381] cgroup_mkdir+0x706/0xf50 [ 3208.802818] ? cgroup_destroy_locked+0x710/0x710 [ 3208.803358] kernfs_iop_mkdir+0x14d/0x1e0 [ 3208.803833] vfs_mkdir+0x493/0x750 [ 3208.804239] do_mkdirat+0x150/0x2b0 [ 3208.804657] ? user_path_create+0xf0/0xf0 [ 3208.805130] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3208.805737] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3208.806325] do_syscall_64+0x33/0x40 [ 3208.806747] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3208.807339] RIP: 0033:0x7fe296c58b19 [ 3208.807766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3208.809860] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3208.810736] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3208.811548] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3208.812357] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3208.813288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3208.814206] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:28:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xc00e}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:28:03 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xc00e0000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xf0ffffff}, 0x0) 08:28:03 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x34000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xfffff000}, 0x0) 08:28:03 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x102) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00', 0x0, &(0x7f0000000440)='\xd7,+[-&@\x00'], &(0x7f0000000440), 0x1000) fallocate(0xffffffffffffffff, 0x78, 0x0, 0x0) ftruncate(r0, 0x1000003) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x88042, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000100)={0x6, 0xfb}) socket$nl_xfrm(0x10, 0x3, 0x6) preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000b80)=""/145, 0x91}, {&(0x7f0000000b00)=""/108, 0x6c}], 0x3, 0x1, 0x8) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0xb2, 0xd34, 0x1, 0x1f, 0x4}) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f00000008c0)=@v3={0x3000000, [{}, {0x1ff, 0x7f}]}, 0x18, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 08:28:03 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x80000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000040)='./file0/file0\x00', 0xc104, 0x0, 0x0, 0x4bbdbe2f48ce6f9c, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:28:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 14) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 3209.059533] FAULT_INJECTION: forcing a failure. [ 3209.059533] name failslab, interval 1, probability 0, space 0, times 0 [ 3209.062413] CPU: 1 PID: 15064 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3209.063976] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3209.065867] Call Trace: [ 3209.066466] dump_stack+0x107/0x167 [ 3209.067295] should_fail.cold+0x5/0xa [ 3209.068170] should_failslab+0x5/0x20 [ 3209.069041] __kmalloc_track_caller+0x79/0x370 [ 3209.070079] ? kstrdup_const+0x53/0x80 [ 3209.070964] ? find_held_lock+0x2c/0x110 [ 3209.071892] kstrdup+0x36/0x70 [ 3209.072621] kstrdup_const+0x53/0x80 [ 3209.073466] __kernfs_new_node+0x9d/0x860 [ 3209.074425] ? mark_held_locks+0x9e/0xe0 [ 3209.075349] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3209.076426] ? cpumask_next+0x1f/0x30 [ 3209.077292] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3209.078362] ? pcpu_alloc+0x12a/0x1240 [ 3209.079255] kernfs_new_node+0x18d/0x250 [ 3209.080184] kernfs_create_dir_ns+0x49/0x160 [ 3209.081189] cgroup_mkdir+0x315/0xf50 [ 3209.082070] ? cgroup_destroy_locked+0x710/0x710 [ 3209.083138] kernfs_iop_mkdir+0x14d/0x1e0 [ 3209.084090] vfs_mkdir+0x493/0x750 [ 3209.084893] do_mkdirat+0x150/0x2b0 [ 3209.085736] ? user_path_create+0xf0/0xf0 [ 3209.086682] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3209.087869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3209.089056] do_syscall_64+0x33/0x40 [ 3209.089909] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3209.091073] RIP: 0033:0x7fe296c58b19 [ 3209.091918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3209.096099] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3209.097832] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3209.099440] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3209.101197] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3209.102827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3209.104434] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:28:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xffffff7f}, 0x0) 08:28:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) r1 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) openat(r1, &(0x7f0000000080)='./file0\x00', 0x428000, 0x20) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x184) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r2, &(0x7f00000004c0)='./file0\x00', 0x200) 08:28:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 15) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:28:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:28:15 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:15 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x400300}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0xa, 0x0, {0xe}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x3ffc, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000280), &(0x7f0000000300)=@sha1={0x1, "9f8ce3fd5eba33278ce4ec989be7aeef64c50e03"}, 0x15, 0x2) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000fddbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b"], 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'geneve0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) lseek(r0, 0x1, 0x4) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYBLOB="40f634c43b", @ANYBLOB="2dcadbce1e98ace8da0b4dfec1f216461337bcd377ae8319be7dd63193f293a9864d5901d97776f5aea393a769f386f38fdcf7b5cae7ca2d1efcf542964995b5ec193128d1578333cb4d78d81441041bc4cbc14e5e8a001ccada686954329b7ec11f6967b95ff93274f1fdec7205b0f379bca9e23c137f904794ddacb808b5844bf86ac331e67c3bd6c1036702a1e873350d52d3a48437a0a395d0f1c34f6a71aedc6a2fb40409d04523d5a010cda5"], 0x100}}, 0x10) unshare(0x48020200) 08:28:15 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x1000000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) [ 3221.796246] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 08:28:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xffffff9e}, 0x0) [ 3221.826500] FAULT_INJECTION: forcing a failure. [ 3221.826500] name failslab, interval 1, probability 0, space 0, times 0 [ 3221.829356] CPU: 1 PID: 15082 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3221.830932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3221.832832] Call Trace: [ 3221.833439] dump_stack+0x107/0x167 [ 3221.834296] should_fail.cold+0x5/0xa [ 3221.835188] ? create_object.isra.0+0x3a/0xa20 [ 3221.836255] should_failslab+0x5/0x20 [ 3221.837144] kmem_cache_alloc+0x5b/0x310 [ 3221.838115] create_object.isra.0+0x3a/0xa20 [ 3221.839125] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3221.840303] __kmalloc_track_caller+0x177/0x370 [ 3221.841370] ? kstrdup_const+0x53/0x80 [ 3221.842273] ? find_held_lock+0x2c/0x110 [ 3221.843211] kstrdup+0x36/0x70 [ 3221.843951] kstrdup_const+0x53/0x80 [ 3221.844808] __kernfs_new_node+0x9d/0x860 [ 3221.845768] ? mark_held_locks+0x9e/0xe0 [ 3221.846710] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3221.847805] ? cpumask_next+0x1f/0x30 [ 3221.848684] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3221.849765] ? pcpu_alloc+0x12a/0x1240 [ 3221.850669] kernfs_new_node+0x18d/0x250 [ 3221.851610] kernfs_create_dir_ns+0x49/0x160 [ 3221.852628] cgroup_mkdir+0x315/0xf50 [ 3221.853515] ? cgroup_destroy_locked+0x710/0x710 [ 3221.854611] kernfs_iop_mkdir+0x14d/0x1e0 [ 3221.855567] vfs_mkdir+0x493/0x750 [ 3221.856391] do_mkdirat+0x150/0x2b0 [ 3221.857232] ? user_path_create+0xf0/0xf0 [ 3221.858198] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3221.859405] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3221.860595] do_syscall_64+0x33/0x40 [ 3221.861453] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3221.862682] RIP: 0033:0x7fe296c58b19 [ 3221.863538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3221.867788] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3221.869544] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3221.871196] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3221.872852] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3221.874501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3221.876142] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:28:16 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x34000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:28:16 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)={0x4002, 0x124, 0x1}, 0x18) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) 08:28:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xfffffff0}, 0x0) 08:28:16 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x2000000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:28:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x80000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:28:16 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x1, 0x4f, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:28:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 16) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:28:16 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x8000000000000}, 0x0) [ 3222.186235] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 08:28:16 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x3000000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) [ 3222.275127] syz-executor.1 (15081) used greatest stack depth: 23480 bytes left [ 3222.296920] FAULT_INJECTION: forcing a failure. [ 3222.296920] name failslab, interval 1, probability 0, space 0, times 0 [ 3222.299709] CPU: 0 PID: 15136 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3222.301199] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3222.302957] Call Trace: [ 3222.303524] dump_stack+0x107/0x167 [ 3222.304295] should_fail.cold+0x5/0xa [ 3222.305108] ? __kernfs_new_node+0xd4/0x860 [ 3222.306028] should_failslab+0x5/0x20 [ 3222.306829] kmem_cache_alloc+0x5b/0x310 [ 3222.307689] __kernfs_new_node+0xd4/0x860 [ 3222.308562] ? mark_held_locks+0x9e/0xe0 [ 3222.309442] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3222.310548] ? cpumask_next+0x1f/0x30 [ 3222.311472] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3222.312648] ? pcpu_alloc+0x12a/0x1240 [ 3222.313500] kernfs_new_node+0x18d/0x250 [ 3222.314397] kernfs_create_dir_ns+0x49/0x160 [ 3222.315359] cgroup_mkdir+0x315/0xf50 [ 3222.316192] ? cgroup_destroy_locked+0x710/0x710 [ 3222.317225] kernfs_iop_mkdir+0x14d/0x1e0 [ 3222.318132] vfs_mkdir+0x493/0x750 [ 3222.318908] do_mkdirat+0x150/0x2b0 [ 3222.319696] ? user_path_create+0xf0/0xf0 [ 3222.320601] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3222.321748] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3222.322869] do_syscall_64+0x33/0x40 [ 3222.323676] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3222.324789] RIP: 0033:0x7fe296c58b19 [ 3222.325595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3222.329585] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3222.331230] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3222.332761] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3222.334299] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3222.335827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3222.337359] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:28:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x400300}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:28:29 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x4000000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:28:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 17) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:28:29 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x640, 0x100) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x1000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="00b835ef2fcd0b628e10e82879a6a1b56ce4a90ac830a3592495d1edcdcfefd2ce808c539176fff700ca451c3efaa84894753c4012c3aebf3b286ac72b62f702a2ec247240a007af781fb3e7840095d8d74993067c0a7b4aa2ab88be6d61b3e41f08120991c83595499e40255cc77ee8fca088c5ff415896b6791106983d5ad7605b34c81af00c0a02ba26d958771b56c5acd46bbd64b3ba04c206cd76214581c471a65e00c167a1ad9e60a68d12109052a1450f14494d", 0xb7, 0x10001}], 0xa004, &(0x7f00000014c0)=ANY=[@ANYBLOB='grpquota,appraise,fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',obj_type=vfat\x00,appraise_type=imasig,uid=', @ANYRESDEC=0xee00, @ANYBLOB="000010803d25254651a535b55614f9dc16271b536e55d296d5794b3a7a62299279199ffa919f2cba4f46", @ANYRESDEC=r0, @ANYBLOB=',\x00']) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) chdir(&(0x7f0000000040)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 08:28:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x40030000000000}, 0x0) 08:28:29 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3235.311425] FAULT_INJECTION: forcing a failure. [ 3235.311425] name failslab, interval 1, probability 0, space 0, times 0 [ 3235.313251] CPU: 0 PID: 15158 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3235.314251] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3235.315425] Call Trace: [ 3235.315806] dump_stack+0x107/0x167 [ 3235.316326] should_fail.cold+0x5/0xa [ 3235.316863] ? create_object.isra.0+0x3a/0xa20 [ 3235.317505] should_failslab+0x5/0x20 [ 3235.318053] kmem_cache_alloc+0x5b/0x310 [ 3235.318630] create_object.isra.0+0x3a/0xa20 [ 3235.319246] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3235.319967] kmem_cache_alloc+0x159/0x310 [ 3235.320556] __kernfs_new_node+0xd4/0x860 [ 3235.321158] ? mark_held_locks+0x9e/0xe0 [ 3235.321738] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3235.322414] ? cpumask_next+0x1f/0x30 [ 3235.322952] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3235.323610] ? pcpu_alloc+0x12a/0x1240 [ 3235.324167] kernfs_new_node+0x18d/0x250 [ 3235.324743] kernfs_create_dir_ns+0x49/0x160 [ 3235.325363] cgroup_mkdir+0x315/0xf50 [ 3235.325911] ? cgroup_destroy_locked+0x710/0x710 [ 3235.326581] kernfs_iop_mkdir+0x14d/0x1e0 [ 3235.327164] vfs_mkdir+0x493/0x750 [ 3235.327666] do_mkdirat+0x150/0x2b0 [ 3235.328182] ? user_path_create+0xf0/0xf0 [ 3235.328766] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3235.329504] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3235.330240] do_syscall_64+0x33/0x40 [ 3235.330762] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3235.331484] RIP: 0033:0x7fe296c58b19 [ 3235.332009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3235.334602] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3235.335680] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3235.336675] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3235.337682] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3235.338693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3235.339694] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:28:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0xa, 0x0, {0xe}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x3ffc, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000280), &(0x7f0000000300)=@sha1={0x1, "9f8ce3fd5eba33278ce4ec989be7aeef64c50e03"}, 0x15, 0x2) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000fddbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b"], 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'geneve0\x00'}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) lseek(r0, 0x1, 0x4) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYBLOB="40f634c43b", @ANYBLOB="2dcadbce1e98ace8da0b4dfec1f216461337bcd377ae8319be7dd63193f293a9864d5901d97776f5aea393a769f386f38fdcf7b5cae7ca2d1efcf542964995b5ec193128d1578333cb4d78d81441041bc4cbc14e5e8a001ccada686954329b7ec11f6967b95ff93274f1fdec7205b0f379bca9e23c137f904794ddacb808b5844bf86ac331e67c3bd6c1036702a1e873350d52d3a48437a0a395d0f1c34f6a71aedc6a2fb40409d04523d5a010cda5"], 0x100}}, 0x10) unshare(0x48020200) [ 3235.376770] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 08:28:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) recvmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000040), 0x6e, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000140)=""/119, 0x77}, {&(0x7f00000001c0)=""/171, 0xab}, {&(0x7f0000000280)=""/126, 0x7e}, {&(0x7f00000003c0)=""/124, 0x7c}], 0x5, &(0x7f0000000300)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x22) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) 08:28:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xf0ffffffffffff}, 0x0) 08:28:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) recvmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000040), 0x6e, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000140)=""/119, 0x77}, {&(0x7f00000001c0)=""/171, 0xab}, {&(0x7f0000000280)=""/126, 0x7e}, {&(0x7f00000003c0)=""/124, 0x7c}], 0x5, &(0x7f0000000300)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x22) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) 08:28:42 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0/file0\x00'}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 08:28:42 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:42 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:42 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xc040000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:28:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 18) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:28:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:28:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 3247.908766] cgroup2: Unknown parameter 'noredMulti [ 3247.908766] UdpLite: 0 0 0 0 0 0 0 0 [ 3247.908766] ' 08:28:42 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xf000000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:28:42 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x100000000000000}, 0x0) [ 3247.928964] FAULT_INJECTION: forcing a failure. [ 3247.928964] name failslab, interval 1, probability 0, space 0, times 0 [ 3247.933232] CPU: 1 PID: 15196 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3247.934799] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3247.936704] Call Trace: [ 3247.937293] dump_stack+0x107/0x167 [ 3247.938124] should_fail.cold+0x5/0xa [ 3247.938975] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3247.940298] should_failslab+0x5/0x20 [ 3247.941151] kmem_cache_alloc+0x5b/0x310 [ 3247.942100] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3247.943367] idr_get_free+0x4b5/0x8f0 [ 3247.944239] idr_alloc_u32+0x170/0x2d0 [ 3247.945115] ? __fprop_inc_percpu_max+0x130/0x130 [ 3247.946211] ? lock_acquire+0x197/0x470 [ 3247.947110] ? __kernfs_new_node+0xff/0x860 [ 3247.948097] idr_alloc_cyclic+0x102/0x230 [ 3247.949041] ? idr_alloc+0x130/0x130 [ 3247.949886] ? rwlock_bug.part.0+0x90/0x90 [ 3247.950845] __kernfs_new_node+0x117/0x860 [ 3247.951820] ? mark_held_locks+0x9e/0xe0 [ 3247.952768] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3247.953848] ? cpumask_next+0x1f/0x30 [ 3247.954707] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3247.955764] ? pcpu_alloc+0x12a/0x1240 [ 3247.956646] kernfs_new_node+0x18d/0x250 08:28:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 3247.957556] kernfs_create_dir_ns+0x49/0x160 08:28:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='virtiofs\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) [ 3247.958715] cgroup_mkdir+0x315/0xf50 [ 3247.959698] ? cgroup_destroy_locked+0x710/0x710 [ 3247.960752] kernfs_iop_mkdir+0x14d/0x1e0 [ 3247.961679] vfs_mkdir+0x493/0x750 [ 3247.962495] do_mkdirat+0x150/0x2b0 [ 3247.963316] ? user_path_create+0xf0/0xf0 [ 3247.964259] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3247.965459] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3247.966640] do_syscall_64+0x33/0x40 [ 3247.967475] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3247.968632] RIP: 0033:0x7fe296c58b19 [ 3247.969472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3247.973653] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3247.975402] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3247.977036] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3247.978655] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 08:28:42 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3247.980264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3247.982116] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:28:42 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) recvmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000040), 0x6e, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000140)=""/119, 0x77}, {&(0x7f00000001c0)=""/171, 0xab}, {&(0x7f0000000280)=""/126, 0x7e}, {&(0x7f00000003c0)=""/124, 0x7c}], 0x5, &(0x7f0000000300)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x22) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) 08:28:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:28:42 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x200000000000000}, 0x0) 08:28:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:28:42 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:42 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0xda0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:28:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 19) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:28:56 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0xf) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xf00000000000000}, 0x0) 08:28:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:28:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) recvmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000040), 0x6e, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000140)=""/119, 0x77}, {&(0x7f00000001c0)=""/171, 0xab}, {&(0x7f0000000280)=""/126, 0x7e}, {&(0x7f00000003c0)=""/124, 0x7c}], 0x5, &(0x7f0000000300)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x22) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) 08:28:56 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:28:56 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x40000000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:28:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 3262.208141] cgroup2: Unknown parameter 'noredMulti [ 3262.208141] UdpLite: 0 0 0 0 0 0 0 0 [ 3262.208141] ' 08:28:56 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0xf0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3262.233510] FAULT_INJECTION: forcing a failure. [ 3262.233510] name failslab, interval 1, probability 0, space 0, times 0 [ 3262.236411] CPU: 1 PID: 15268 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3262.238022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3262.239954] Call Trace: [ 3262.240574] dump_stack+0x107/0x167 [ 3262.241420] should_fail.cold+0x5/0xa [ 3262.242293] ? create_object.isra.0+0x3a/0xa20 [ 3262.243339] should_failslab+0x5/0x20 [ 3262.244199] kmem_cache_alloc+0x5b/0x310 [ 3262.245124] create_object.isra.0+0x3a/0xa20 [ 3262.246126] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3262.247285] kmem_cache_alloc+0x159/0x310 08:28:56 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x81000000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) [ 3262.248233] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3262.249603] idr_get_free+0x4b5/0x8f0 [ 3262.250530] idr_alloc_u32+0x170/0x2d0 [ 3262.251441] ? __fprop_inc_percpu_max+0x130/0x130 [ 3262.252555] ? lock_acquire+0x197/0x470 [ 3262.253471] ? __kernfs_new_node+0xff/0x860 [ 3262.254492] idr_alloc_cyclic+0x102/0x230 [ 3262.255450] ? idr_alloc+0x130/0x130 [ 3262.256302] ? rwlock_bug.part.0+0x90/0x90 [ 3262.257292] __kernfs_new_node+0x117/0x860 [ 3262.258261] ? mark_held_locks+0x9e/0xe0 [ 3262.259202] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3262.260295] ? cpumask_next+0x1f/0x30 [ 3262.261175] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3262.262268] ? pcpu_alloc+0x12a/0x1240 08:28:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 3262.263173] kernfs_new_node+0x18d/0x250 [ 3262.264185] kernfs_create_dir_ns+0x49/0x160 [ 3262.265182] cgroup_mkdir+0x315/0xf50 [ 3262.266060] ? cgroup_destroy_locked+0x710/0x710 [ 3262.267125] kernfs_iop_mkdir+0x14d/0x1e0 [ 3262.268081] vfs_mkdir+0x493/0x750 [ 3262.268897] do_mkdirat+0x150/0x2b0 [ 3262.269737] ? user_path_create+0xf0/0xf0 [ 3262.270689] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3262.271893] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3262.273082] do_syscall_64+0x33/0x40 [ 3262.273935] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3262.275116] RIP: 0033:0x7fe296c58b19 [ 3262.275969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3262.280170] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3262.281923] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3262.283576] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3262.285196] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3262.286807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3262.288407] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:28:56 executing program 1: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x1000000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:28:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x8100000000000000}, 0x0) 08:28:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:29:08 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x9effffff, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:29:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mount(&(0x7f0000000040)=@sr0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='exofs\x00', 0x2000000, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x7fffffff, 0x4, &(0x7f00000002c0)=[{&(0x7f00000001c0)="8cf961752c0a451a7a0a7a4f047931aa76f286e0e97683cd00edcedbec0ddae426a3e1c3b5853b92693dfa5eefbdd51b567d8a6cb80e79dc1bbf2551b7cf0a5be7b7b3949b97fa0b15a1e5d8a84bc8509a32ef045408d0a8fcccb19be9cb98fe40230deff459798866a16b4e5591e302f78dec3ced7d3d7dcd9499ab18d01205acd787cdf8c8af4cefc29aa5ac490e9ee6b61a52", 0x94, 0x3ff}, {&(0x7f00000003c0)="f4c08ff71ede0071995c71411c95a5ccf565467edd2b3543172e396a15f86dc1d1586d7fb1227de27583a615f0dfc4fc75d663a0f6d3049ac12c1f43d7867f1978298cf254025fc71f85b1a662b6fb64c50711e7278eff8fad1dda44e20f5e54f46c0ced9607358fa81425a6230c814a80655b1531de04bf6b8c763559a785ae778a40c5fd4581ab64cf2eabf9f697272c886b46de1e94407bfe0db81c7b3bdca3f3f11a0614f3948e1e97ab20ffe46c1a013d5f3c0ca1b7c660305f46172a341e312401cf682d6ebaa0da38d8b2412c67fece12aac08668eeaa55ed4e53bd47400655090b23177c6813b41f7c74", 0xee, 0x7}, {&(0x7f0000000500)="7e45048178c9e7a07580b759b8a3d1f3a01239c7f10304d92d17f4dc60980d5bda15dccba0b4059c0458cfc87a417d34fc4c9e988f6caa159799eb32efd54d342eb5880e262759fbd1510b572aa5e0d350cac9aded694e7d960017ef6a6d20503d6145651a4688211408408ebe5732f9bfcf1877ed9cf43b7994bb58833e25afc29c8e10066ac0a6b1076050616ca3e4d3bb433600e73698b727892aab722760fe31ea712afc7f3ef312c4b4f04f8ede630ecf405cede7136814eee635ade99fdc88f5378e1d7f2a", 0xc8, 0x4}, {&(0x7f0000000280)="c1b239acfce0da3ad9961ba365c9a81787b051a4f188a1c706b39f4f064b2472f36d750ba3811493e8ad427a1d5c5dd39378db26f6452f", 0x37, 0x1}], 0x2008000, &(0x7f0000000600)={[{@utf8}, {@nonumtail}, {@shortname_win95}, {@fat=@check_strict}, {@numtail}, {@numtail}], [{@euid_gt={'euid>', 0xee01}}, {@measure}, {@dont_measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x62, 0x62, 0x30, 0x35, 0x31, 0x37, 0x31], 0x2d, [0x35, 0x50, 0x62, 0x35], 0x2d, [0x66, 0x31, 0x37, 0x37], 0x2d, [0x63, 0x32, 0x38, 0x62], 0x2d, [0x30, 0x31, 0x30, 0x57, 0x63, 0x33, 0x39, 0x66]}}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}]}) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:29:08 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 20) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:29:08 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x1b0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:08 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xa7010000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:29:08 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa0, r2, 0x300, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x40, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x1c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x10, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x41}, 0x40080) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}]}) 08:29:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x9a02000000000000}, 0x0) [ 3273.930186] FAULT_INJECTION: forcing a failure. [ 3273.930186] name failslab, interval 1, probability 0, space 0, times 0 [ 3273.932124] CPU: 0 PID: 15311 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3273.933134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3273.934347] Call Trace: [ 3273.934738] dump_stack+0x107/0x167 [ 3273.935273] should_fail.cold+0x5/0xa [ 3273.935832] ? selinux_kernfs_init_security+0x137/0x4c0 [ 3273.936613] should_failslab+0x5/0x20 [ 3273.937170] __kmalloc+0x72/0x390 [ 3273.937679] selinux_kernfs_init_security+0x137/0x4c0 [ 3273.938437] ? selinux_file_mprotect+0x610/0x610 [ 3273.939098] ? find_held_lock+0x2c/0x110 [ 3273.939701] ? __kernfs_new_node+0x2ad/0x860 [ 3273.940344] ? lock_downgrade+0x6d0/0x6d0 [ 3273.940927] ? rwlock_bug.part.0+0x90/0x90 [ 3273.941544] security_kernfs_init_security+0x4e/0xb0 [ 3273.942289] __kernfs_new_node+0x531/0x860 [ 3273.942906] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3273.943596] ? cpumask_next+0x1f/0x30 [ 3273.944147] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3273.944828] ? pcpu_alloc+0x12a/0x1240 [ 3273.945387] kernfs_new_node+0x18d/0x250 [ 3273.945987] kernfs_create_dir_ns+0x49/0x160 [ 3273.946614] cgroup_mkdir+0x315/0xf50 [ 3273.947169] ? cgroup_destroy_locked+0x710/0x710 [ 3273.947823] kernfs_iop_mkdir+0x14d/0x1e0 [ 3273.948620] vfs_mkdir+0x493/0x750 [ 3273.949124] do_mkdirat+0x150/0x2b0 [ 3273.949641] ? user_path_create+0xf0/0xf0 [ 3273.950232] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3273.950994] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3273.951718] do_syscall_64+0x33/0x40 [ 3273.952254] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3273.952984] RIP: 0033:0x7fe296c58b19 [ 3273.953517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3273.956101] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3273.957165] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3273.958177] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3273.959160] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3273.960190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3273.961228] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 [ 3273.965712] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 08:29:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x9effffff00000000}, 0x0) 08:29:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xc00e0000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:29:08 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:08 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x300) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:08 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 21) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:29:08 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xc00e0000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) [ 3274.091314] syz-executor.1 (15312) used greatest stack depth: 22928 bytes left [ 3274.104772] FAULT_INJECTION: forcing a failure. [ 3274.104772] name failslab, interval 1, probability 0, space 0, times 0 [ 3274.106288] CPU: 0 PID: 15335 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3274.107114] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3274.108075] Call Trace: [ 3274.108380] dump_stack+0x107/0x167 [ 3274.108797] should_fail.cold+0x5/0xa [ 3274.109244] ? create_object.isra.0+0x3a/0xa20 [ 3274.109771] should_failslab+0x5/0x20 [ 3274.110217] kmem_cache_alloc+0x5b/0x310 [ 3274.110683] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3274.111240] create_object.isra.0+0x3a/0xa20 [ 3274.111776] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3274.112381] __kmalloc+0x16e/0x390 [ 3274.112817] selinux_kernfs_init_security+0x137/0x4c0 [ 3274.113431] ? selinux_file_mprotect+0x610/0x610 [ 3274.113995] ? find_held_lock+0x2c/0x110 [ 3274.114494] ? __kernfs_new_node+0x2ad/0x860 [ 3274.115016] ? lock_downgrade+0x6d0/0x6d0 [ 3274.115510] ? rwlock_bug.part.0+0x90/0x90 [ 3274.116013] security_kernfs_init_security+0x4e/0xb0 [ 3274.116619] __kernfs_new_node+0x531/0x860 [ 3274.117122] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3274.117683] ? cpumask_next+0x1f/0x30 [ 3274.118140] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3274.118692] ? pcpu_alloc+0x12a/0x1240 [ 3274.119163] kernfs_new_node+0x18d/0x250 [ 3274.119645] kernfs_create_dir_ns+0x49/0x160 [ 3274.120172] cgroup_mkdir+0x315/0xf50 [ 3274.120609] ? cgroup_destroy_locked+0x710/0x710 [ 3274.121164] kernfs_iop_mkdir+0x14d/0x1e0 [ 3274.121652] vfs_mkdir+0x493/0x750 [ 3274.122072] do_mkdirat+0x150/0x2b0 [ 3274.122517] ? user_path_create+0xf0/0xf0 [ 3274.122990] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3274.123607] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3274.124222] do_syscall_64+0x33/0x40 [ 3274.124666] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3274.125251] RIP: 0033:0x7fe296c58b19 [ 3274.125690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3274.127871] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3274.128739] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3274.129583] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3274.130439] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3274.131282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3274.132124] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:29:20 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xa0010000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:20 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)=0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2081081, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'vfat\x00'}}, {@access_any}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', r2}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x63, 0x33, 0x62, 0x64, 0x62, 0x0, 0x62], 0x2d, [0x37, 0x62, 0x69, 0x35], 0x2d, [0x32, 0x39, 0x31, 0x35], 0x2d, [0x36, 0x66, 0x33, 0x64], 0x2d, [0x34, 0x36, 0x35, 0x50, 0x36, 0x39, 0x64, 0x39]}}}, {@uid_gt={'uid>', r4}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@measure}, {@measure}, {@uid_eq={'uid', 0x3d, r5}}]}}) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) 08:29:20 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0xec0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:20 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000140), 0x8000, 0x80000) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)={0x20, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0xc, 0x40, 0x0, 0x0, @str='keyring\x00'}]}, 0x20}}, 0x0) perf_event_open(&(0x7f0000000440)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r4, 0x5325, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x303c00, 0x0) fcntl$setsig(r5, 0xa, 0x0) r6 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r6, 0x5325, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000080)={0x7, 0x0, &(0x7f0000000040)=[r4, r1, r6]}, 0x3) add_key$keyring(&(0x7f00000003c0), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$nl_generic(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={0x0, 0x14}, 0x1, 0x0, 0x0, 0x801}, 0x20040000) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000100)=0x5) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x48020200) 08:29:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xf0ffffff00000000}, 0x0) 08:29:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:29:20 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xf0ffffff, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:29:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 22) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 3286.512765] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 08:29:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xffffff7f00000000}, 0x0) 08:29:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:29:20 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x1d8) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) [ 3286.608252] FAULT_INJECTION: forcing a failure. [ 3286.608252] name failslab, interval 1, probability 0, space 0, times 0 [ 3286.610204] CPU: 1 PID: 15363 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3286.611197] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3286.612363] Call Trace: [ 3286.612753] dump_stack+0x107/0x167 [ 3286.613273] should_fail.cold+0x5/0xa [ 3286.613823] should_failslab+0x5/0x20 [ 3286.614373] __kmalloc_track_caller+0x79/0x370 [ 3286.615021] ? security_context_to_sid_core+0xb4/0x890 [ 3286.615770] kmemdup_nul+0x2d/0xa0 [ 3286.616269] security_context_to_sid_core+0xb4/0x890 [ 3286.616991] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 3286.617753] ? do_raw_spin_lock+0x121/0x260 [ 3286.618370] ? rwlock_bug.part.0+0x90/0x90 [ 3286.618960] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3286.619642] ? do_raw_spin_unlock+0x4f/0x220 [ 3286.620263] ? _raw_spin_unlock+0x1a/0x30 [ 3286.620851] security_context_to_sid+0x35/0x50 [ 3286.621514] selinux_kernfs_init_security+0x19d/0x4c0 [ 3286.622241] ? selinux_file_mprotect+0x610/0x610 [ 3286.622965] ? find_held_lock+0x2c/0x110 [ 3286.623545] ? __kernfs_new_node+0x2ad/0x860 [ 3286.624167] ? lock_downgrade+0x6d0/0x6d0 [ 3286.624751] ? rwlock_bug.part.0+0x90/0x90 [ 3286.625353] security_kernfs_init_security+0x4e/0xb0 [ 3286.626068] __kernfs_new_node+0x531/0x860 [ 3286.626674] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3286.627341] ? cpumask_next+0x1f/0x30 [ 3286.627882] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3286.628546] ? pcpu_alloc+0x12a/0x1240 [ 3286.629096] kernfs_new_node+0x18d/0x250 [ 3286.629679] kernfs_create_dir_ns+0x49/0x160 [ 3286.630310] cgroup_mkdir+0x315/0xf50 [ 3286.630847] ? cgroup_destroy_locked+0x710/0x710 [ 3286.631511] kernfs_iop_mkdir+0x14d/0x1e0 [ 3286.632099] vfs_mkdir+0x493/0x750 [ 3286.632604] do_mkdirat+0x150/0x2b0 [ 3286.633117] ? user_path_create+0xf0/0xf0 [ 3286.633705] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3286.634448] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3286.635173] do_syscall_64+0x33/0x40 [ 3286.635699] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3286.636418] RIP: 0033:0x7fe296c58b19 [ 3286.636940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3286.639541] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3286.640614] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3286.641618] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3286.642623] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3286.643624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3286.644627] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:29:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0xfffffffffffff000}, 0x0) 08:29:20 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0xf00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:20 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xc00e0000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:20 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xfffff000, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:29:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:29:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 23) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:29:20 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x4000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0x2}, 0x0) [ 3286.871790] FAULT_INJECTION: forcing a failure. [ 3286.871790] name failslab, interval 1, probability 0, space 0, times 0 [ 3286.875047] CPU: 0 PID: 15400 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3286.876633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3286.878547] Call Trace: [ 3286.879154] dump_stack+0x107/0x167 [ 3286.879965] should_fail.cold+0x5/0xa [ 3286.880843] ? create_object.isra.0+0x3a/0xa20 [ 3286.881894] should_failslab+0x5/0x20 [ 3286.882786] kmem_cache_alloc+0x5b/0x310 [ 3286.883727] create_object.isra.0+0x3a/0xa20 [ 3286.884738] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3286.885932] __kmalloc_track_caller+0x177/0x370 [ 3286.887029] ? security_context_to_sid_core+0xb4/0x890 [ 3286.888240] kmemdup_nul+0x2d/0xa0 [ 3286.889066] security_context_to_sid_core+0xb4/0x890 [ 3286.890260] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 3286.891503] ? do_raw_spin_lock+0x121/0x260 [ 3286.892502] ? rwlock_bug.part.0+0x90/0x90 [ 3286.893565] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3286.894706] ? do_raw_spin_unlock+0x4f/0x220 [ 3286.895748] ? _raw_spin_unlock+0x1a/0x30 [ 3286.896706] security_context_to_sid+0x35/0x50 [ 3286.897764] selinux_kernfs_init_security+0x19d/0x4c0 [ 3286.898980] ? selinux_file_mprotect+0x610/0x610 [ 3286.900081] ? find_held_lock+0x2c/0x110 [ 3286.901031] ? __kernfs_new_node+0x2ad/0x860 [ 3286.902055] ? lock_downgrade+0x6d0/0x6d0 [ 3286.903035] ? rwlock_bug.part.0+0x90/0x90 [ 3286.904025] security_kernfs_init_security+0x4e/0xb0 [ 3286.905184] __kernfs_new_node+0x531/0x860 [ 3286.906177] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3286.907290] ? cpumask_next+0x1f/0x30 [ 3286.908157] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3286.909224] ? pcpu_alloc+0x12a/0x1240 [ 3286.910147] kernfs_new_node+0x18d/0x250 [ 3286.911101] kernfs_create_dir_ns+0x49/0x160 [ 3286.912120] cgroup_mkdir+0x315/0xf50 [ 3286.913008] ? cgroup_destroy_locked+0x710/0x710 [ 3286.914128] kernfs_iop_mkdir+0x14d/0x1e0 [ 3286.915113] vfs_mkdir+0x493/0x750 [ 3286.916041] do_mkdirat+0x150/0x2b0 [ 3286.917103] ? user_path_create+0xf0/0xf0 [ 3286.918330] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3286.919595] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3286.920787] do_syscall_64+0x33/0x40 [ 3286.921650] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3286.922858] RIP: 0033:0x7fe296c58b19 [ 3286.923723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3286.927990] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3286.929729] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3286.931388] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3286.932984] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3286.934613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3286.936271] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:29:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 24) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:29:33 executing program 1: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xa0010000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) clock_gettime(0x0, &(0x7f0000001f80)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001f00)=[{{&(0x7f0000000280), 0x6e, &(0x7f0000000880)=[{&(0x7f00000003c0)=""/136, 0x88}, {&(0x7f0000000300)=""/58, 0x3a}, {&(0x7f0000000480)=""/41, 0x29}, {&(0x7f0000000500)=""/146, 0x92}, {&(0x7f00000005c0)=""/216, 0xd8}, {&(0x7f00000006c0)=""/182, 0xb6}, {&(0x7f0000000780)=""/210, 0xd2}], 0x7, &(0x7f0000000900)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/118, 0x76}, {&(0x7f00000019c0)=""/241, 0xf1}, {&(0x7f0000001ac0)=""/192, 0xc0}, {&(0x7f0000001b80)=""/229, 0xe5}, {&(0x7f0000001c80)=""/201, 0xc9}], 0x6, &(0x7f0000001e00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe8}}], 0x2, 0x0, &(0x7f0000001fc0)={r1, r2+10000000}) stat(&(0x7f0000000140)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x3, &(0x7f0000000200)=[{&(0x7f00000000c0)='\fw', 0x2, 0xfff}, {&(0x7f0000000140)="241a0f9503a5d0c68ec36b076106d9a1cc0574eb90d5701d9b04ef9f5a5db8ce3e7e1236d320f665380c4d969d6b63771cb95080c24382cbbaf7b42c7608b07121aa28db6cb80baa0defaaf537c76cc6a9bbdcf8255c3809d15ae787bb0b76b748e8bbf7", 0x64, 0x2}, {&(0x7f00000001c0), 0x0, 0x4}], 0x40004, &(0x7f0000002000)={[{@resuid={'resuid', 0x3d, r3}}, {@user_xattr}, {@discard}, {@jqfmt_vfsold}, {@orlov}, {@jqfmt_vfsold}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@subj_user={'subj_user', 0x3d, '\xe1%{%%+'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_lt={'uid<', r5}}]}) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) fsetxattr$security_capability(r4, &(0x7f00000020c0), &(0x7f0000002100)=@v1={0x1000000, [{0x496, 0x6}]}, 0xc, 0xd6e0c84b6bee4647) 08:29:33 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xffffff7f, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:29:33 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:33 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x8100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:29:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0x8}, 0x0) 08:29:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0xf}, 0x0) [ 3299.140610] FAULT_INJECTION: forcing a failure. [ 3299.140610] name failslab, interval 1, probability 0, space 0, times 0 [ 3299.143545] CPU: 1 PID: 15428 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3299.145024] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3299.146805] Call Trace: [ 3299.147371] dump_stack+0x107/0x167 [ 3299.148151] should_fail.cold+0x5/0xa [ 3299.148966] should_failslab+0x5/0x20 [ 3299.149771] __kmalloc_track_caller+0x79/0x370 [ 3299.150741] ? sidtab_sid2str_get+0x17e/0x720 [ 3299.151695] kmemdup+0x23/0x50 [ 3299.152379] sidtab_sid2str_get+0x17e/0x720 [ 3299.153294] sidtab_entry_to_string+0x33/0x110 [ 3299.154271] security_sid_to_context_core+0x33c/0x5d0 [ 3299.155381] selinux_kernfs_init_security+0x239/0x4c0 [ 3299.156470] ? selinux_file_mprotect+0x610/0x610 [ 3299.157475] ? find_held_lock+0x2c/0x110 [ 3299.158337] ? __kernfs_new_node+0x2ad/0x860 [ 3299.159278] ? rwlock_bug.part.0+0x90/0x90 [ 3299.160184] security_kernfs_init_security+0x4e/0xb0 [ 3299.161260] __kernfs_new_node+0x531/0x860 [ 3299.162163] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3299.163168] ? cpumask_next+0x1f/0x30 [ 3299.163974] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3299.164970] ? pcpu_alloc+0x12a/0x1240 [ 3299.165802] kernfs_new_node+0x18d/0x250 [ 3299.166677] kernfs_create_dir_ns+0x49/0x160 [ 3299.167605] cgroup_mkdir+0x315/0xf50 [ 3299.168421] ? cgroup_destroy_locked+0x710/0x710 [ 3299.169427] kernfs_iop_mkdir+0x14d/0x1e0 [ 3299.170304] vfs_mkdir+0x493/0x750 [ 3299.171071] do_mkdirat+0x150/0x2b0 [ 3299.171840] ? user_path_create+0xf0/0xf0 [ 3299.172724] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3299.173831] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3299.174935] do_syscall_64+0x33/0x40 [ 3299.175731] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3299.176814] RIP: 0033:0x7fe296c58b19 [ 3299.177601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3299.181504] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3299.183128] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3299.184631] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3299.186147] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3299.187663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3299.189166] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:29:33 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0xb001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:29:33 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x28}}, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x100, 0x384) unlinkat(r3, &(0x7f00000004c0)='./file0\x00', 0x200) r4 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x7, &(0x7f00000005c0)=[{&(0x7f00000000c0)="2c6f12767df3c2b00cd6af86c85c9a87f31c02d716e39dbbe66786da0bb860891adadd9c7dbcb2825dc5880dfd269248413453223385402bbed31e", 0x3b, 0x7ff}, {&(0x7f0000000140)="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", 0xfa, 0x2}, {&(0x7f0000000240)="3825b6a9d4000377ae657934f558dc9cb00fb48dbc1c59e653856207f41cd84e212a2c9425f6bee64a9189a3a5f57abc52ab2aba683103e402a900afe68c52b2a580b81e7ea5d0a72291993ea4305e01057882a3731075a9ba7847a269252574f8d996192f4feee25f764d052d35843b5b68e6", 0x73, 0x1}, {&(0x7f00000002c0), 0x0, 0x4}, {&(0x7f0000000300)="a7732f960c51b7d2b707ba550eb91baaece78cd2b70bc5880b53cc14df555688e02bb4d518ba269460c907e1f6d5964a8c7f9748de4c06", 0x37, 0x18a}, {&(0x7f00000003c0)="2d3d36ad59600fedfa5215018578d21616aaa5b49116de2836c2d5a8961ceab68f860a78b92d89ec7766dbb264166b9c828d624efa0fb9fbcde7d3554b3b49dc92eb547af2120d0431e8bf36945c349539e5a9b9628e30ea92e8466bd6cf5f601c8a3c42e5b680db787f0acb33bcecdd10931b00027746d4ac64814272376ed409f043762f2a774bea340308bfd7f3d03f8c3d3452be48ecf21c409eeb8ac71e59d822e26e63cec2b77e3889d62782", 0xaf, 0xba30}, {&(0x7f0000000500)="7130d0a3a203aa63b39e21ed6786ceb50cba4c390321608130ca6fafd70a370f25d44e3e389f0c68638735be59b9eb8737faa108c1486dd33bafdbebd5949aed9b2b0ec2de40264d47bd3527cae1e713c64ceb9a5f8ce709a794be2ec40756fd9a47ce4075df9c14a0a120e5ebcf39710f00abba61e10a94acbb6034abd2a599adcc652b787fe3d2140053bbfd67587a", 0x90, 0x23}], 0x1000, &(0x7f0000000680)={[{'cgroup2\x00'}, {'vfat\x00'}, {'vfat\x00'}, {'cgroup2\x00'}], [{@seclabel}, {@fsmagic}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@appraise}]}) mkdirat(r4, &(0x7f0000000480)='./file0/file0\x00', 0x4) open_tree(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x8000) 08:29:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0xf0}, 0x0) 08:29:33 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:29:33 executing program 1: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) r1 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) ioctl$CDROMREADAUDIO(r1, 0x5312, 0x0) 08:29:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 25) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:29:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:29:45 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0xc00e) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0x29a}, 0x0) 08:29:45 executing program 1: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0xa, 0x0, {0xe}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x3ffc, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000280), &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x15, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010026bd7000fddbdf250100a3f76dc4bc5844c4ec0000000000000c4100000014001462726f61646361f2cc2e08767592cc8730953351"], 0x30}}, 0x1) r3 = syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'geneve0\x00', 0x0}) lseek(r0, 0x1, 0x4) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r4, 0x1, 0x6, @local}, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRES16=r3, @ANYBLOB="2dcadbce1e98ace8da0b4dfec1f216461337bcd377ae8319be7dd63193f293a9864d5901d97776f5aea393a769f386f38fdcf7b5cae7ca2d1efcf542964995b5ec193128d1578333cb4d78d81441041bc4cbc14e5e8a001ccada686954329b7ec11f6967b95ff93274f1fdec7205b0f379bca9e23c137f904794ddacb808b5844bf86ac331e67c3bd6c1036702a1e873350d52d3a48437a0a395d0f1c34f6a71aedc6a2fb40409d04523d5a010cda5"], 0x100}, 0x1, 0x0, 0x0, 0x4044084}, 0x0) ioctl$HIDIOCSUSAGES(r2, 0x501c4814, &(0x7f0000000880)={{0x2, 0xffffffff, 0x6, 0x7fff, 0x5}, 0x332, [0xffff, 0x48, 0xda64, 0x4, 0x2d3c4c9e, 0x10000, 0x200, 0x1000, 0x0, 0x5, 0x1, 0x80000001, 0x1, 0x9, 0x4, 0x9, 0x4, 0x1, 0x8, 0x4800, 0x1, 0x4421, 0x200, 0x4, 0x4, 0x6, 0x946, 0x4, 0xffffffff, 0x6, 0x200, 0x3, 0x1000, 0x4, 0x7fffffff, 0x2, 0x2e8f, 0x10001, 0x80000001, 0x3, 0xce0, 0x10000, 0x70, 0xa687, 0xa23f, 0x6, 0xfffffffe, 0x8, 0x5, 0x6, 0x9, 0x5, 0xbd, 0x3, 0x5, 0x1, 0x20, 0x400, 0x1, 0x7, 0x10001, 0x2, 0x7, 0xffffffff, 0x7fffffff, 0x7, 0x9, 0x5, 0x1, 0x6, 0x10000, 0xffffffff, 0x5, 0x6, 0x7, 0x100000, 0x3f, 0xbc, 0x6, 0x5, 0x6, 0x1, 0x0, 0x1, 0x7fffffff, 0x9, 0x7fff, 0xfffffffd, 0x80, 0x101, 0x7, 0x8, 0x63872330, 0xffff, 0x20, 0x2, 0x6, 0xd758, 0x9, 0xdf40, 0x278, 0x1, 0x7386, 0x5, 0x401, 0x4, 0x6, 0x629, 0x4, 0x800, 0xd0c9, 0x1, 0x4, 0x0, 0xbf, 0x7f00, 0x400, 0x8001, 0x7, 0x8, 0x9, 0xfffffffd, 0x4, 0x3, 0x3f, 0x4, 0x7fff, 0x1000, 0x7f, 0xef1, 0x3ea30f17, 0x2, 0x7b, 0x3ff, 0x7ff, 0x20, 0x9, 0x3ff, 0x9, 0x7ff, 0xffff, 0xc0, 0xf95d, 0xe50, 0x4, 0x7ff, 0x7, 0x4, 0x3, 0x81, 0x4, 0x9, 0x3, 0x1, 0x401, 0x2, 0x8, 0x7, 0x8001, 0x5, 0x9, 0x7d1c, 0xcae, 0x4c, 0x4, 0x80, 0x80000000, 0x1, 0x7, 0x200, 0xe3a, 0xa3, 0x8, 0x5, 0x400, 0x1, 0xcc3, 0x9, 0x1, 0x3, 0x40, 0x6, 0xffffffff, 0x9, 0x8001, 0x8, 0xffffffff, 0x1f, 0x1, 0x27dd, 0xfffffff9, 0x7, 0x5a1, 0x0, 0x6dfb, 0x94, 0x400, 0x40, 0x109b, 0x3f, 0xe00, 0x7, 0x7, 0x200, 0x2, 0x7, 0x7, 0x5, 0x6, 0x0, 0x0, 0x1c, 0x800, 0x80, 0x1ff, 0x8, 0x8, 0x9, 0x8001, 0x81, 0x3ff, 0x3ff, 0x1, 0x7, 0x1000, 0x1, 0xb265, 0x7, 0x31, 0x5, 0x5f, 0x72, 0x2, 0x1f, 0x8, 0x7c3, 0x2, 0x3ff, 0x1, 0x3, 0x0, 0x5, 0x43, 0x2, 0x1f, 0x0, 0x7b, 0x4, 0x8, 0x0, 0x5, 0x7fff, 0xfde, 0x3, 0xfffffffc, 0x81, 0x1172, 0x1, 0x2, 0x1, 0x2a7, 0x7f, 0x4, 0x8, 0x5, 0x6d0, 0x7f, 0x1f, 0x800, 0x8, 0x7, 0x3f, 0x0, 0xd, 0x101, 0x7, 0x1, 0x3, 0x6c7, 0x0, 0x8, 0xffffffff, 0x3, 0x1, 0x9, 0x12, 0x1f, 0x0, 0x20, 0x1, 0x28cd, 0x8, 0x9, 0x2, 0x80000000, 0x1, 0x80000000, 0x1, 0x3ff, 0xfffffffc, 0x2, 0x9, 0x1, 0xffffffff, 0xa6f80000, 0x9, 0x400, 0x2d, 0xff, 0x9, 0x3, 0x2, 0xfffffc01, 0x14, 0x0, 0x1, 0x9c, 0x101, 0x6, 0x800, 0x9, 0x200, 0x100, 0x401, 0x0, 0x2, 0x6, 0xf72, 0x4, 0x6c, 0x7, 0x4, 0x1, 0x100, 0xfffffea5, 0x2, 0x0, 0x3, 0x6, 0x8, 0x3, 0xff, 0x80, 0x4, 0xfffffffa, 0x3, 0x9, 0x3, 0x20, 0xcd9f, 0x0, 0x553, 0x6, 0x10000, 0x3, 0x7, 0x10000, 0x3f, 0x64b7fefb, 0x7, 0x3, 0x6, 0x34, 0xd8, 0x6, 0xd0, 0xdf1, 0x4, 0x9c, 0x836b, 0x7fff, 0x7, 0xb1d, 0x8001, 0x1, 0x9, 0x9, 0x8, 0x2, 0x1, 0x2, 0x8, 0x7, 0x1ff, 0x81, 0x0, 0x40, 0x101, 0x1, 0x7, 0xff, 0x7fffffff, 0xd19, 0x7fffffff, 0x0, 0x7, 0x8, 0xa072, 0x100, 0x2, 0xf9d, 0x0, 0x9, 0x80000000, 0x8, 0x7, 0x9, 0x6, 0xbb67, 0x29, 0x6, 0x0, 0x3, 0x9, 0x0, 0x9, 0xd10, 0x6, 0x6, 0x80, 0x2, 0x7, 0x7, 0x8, 0x0, 0x10000, 0x423a916, 0x50c, 0x5, 0x80000000, 0x2, 0x4, 0x5796, 0x0, 0x3f, 0x9, 0xffffffff, 0x5, 0x80000000, 0x2, 0x475, 0xfffffffd, 0x4cf, 0x7fffffff, 0x8, 0xa1, 0x7fffffff, 0x2, 0x2, 0x1, 0x3, 0x10, 0xffffffff, 0x20, 0x20, 0x9, 0x3, 0x7, 0x1f, 0x2, 0x8, 0x7ff, 0xfffffffe, 0x9, 0x5, 0x1, 0x1ff, 0x20308a4, 0x7, 0x8001, 0x2f, 0x4, 0x5, 0x2, 0xad, 0x7, 0x6, 0x0, 0x3, 0x2, 0x1ff, 0x4, 0x1, 0x7, 0x7ff, 0x7, 0x0, 0x2, 0x1a, 0x0, 0x4, 0x7000000, 0xffffff48, 0x7, 0x101, 0x0, 0x0, 0x6, 0x6, 0x6, 0x9, 0x471c, 0x80, 0x8, 0x200, 0x13, 0xfffff1be, 0x3, 0xe3d, 0x0, 0x10001, 0x5, 0xe870, 0x6, 0x100, 0x49, 0xffffc65e, 0x6, 0xffff, 0x8, 0x7, 0x8, 0x4, 0xbf, 0x7, 0x6, 0x7fffffff, 0x129, 0x4, 0x9, 0xffff, 0x0, 0x7, 0x80000001, 0x1, 0x3, 0x7fffffff, 0x0, 0xffff, 0x80, 0x9, 0x7ff80, 0x3, 0x72, 0x400, 0x0, 0x8, 0x10000, 0x800, 0x2, 0x80000001, 0x7fffffff, 0x400000, 0x1, 0x9, 0x7, 0x10001, 0x8001, 0xffff2e3f, 0xa9, 0x1f, 0xf3, 0x0, 0xf7f, 0x40, 0xff, 0x6, 0x4, 0x1cd, 0x800, 0x8001, 0x1, 0x400, 0x10001, 0x2000000, 0x3, 0x8d, 0x3, 0x6, 0x5, 0xbc7, 0x9, 0xfffffffb, 0x2a, 0x92f7, 0x4, 0x8001, 0x27, 0x9, 0x8, 0x1, 0x80000000, 0x48000000, 0x8, 0x5, 0x6, 0x0, 0x10000, 0x9, 0x80, 0x1, 0x10000, 0x1008, 0x6d8674cd, 0x3, 0xb19, 0x40, 0x0, 0x9, 0xc00, 0x4, 0x0, 0x29cf5dc2, 0x8, 0x7, 0x3, 0x12, 0xb8, 0x9, 0x80000001, 0xf, 0x7fff, 0x2, 0x7f, 0xffffffff, 0x78, 0x6, 0x6, 0x7f, 0x7, 0x1000, 0x3ff, 0x7f, 0x80000001, 0xe, 0xfff, 0xf0e, 0x0, 0x3, 0x7, 0xfff, 0xc000000, 0x2, 0x8, 0x0, 0x3, 0x1000, 0xb79, 0x100, 0x0, 0x7, 0x0, 0x6, 0x5, 0x2, 0x7, 0xffffff56, 0x0, 0x400, 0x0, 0x22fabdb9, 0x6, 0x7ff, 0x9, 0x3, 0x2, 0x7a, 0x88, 0x1000, 0x400, 0xffff, 0x9, 0x0, 0x4, 0x4, 0x80000000, 0x5, 0x80, 0x5, 0x7, 0x7fff, 0x6, 0x5, 0x9, 0x3f, 0x8, 0x9, 0x8, 0x9, 0x7f, 0x4, 0x1, 0x8001, 0x69, 0x7ff, 0x1, 0x5, 0x1ff, 0x3ff, 0x1, 0x5, 0x2, 0xc62c, 0x1, 0x6, 0x0, 0x6, 0x46, 0xffff, 0x8, 0x8, 0x4, 0x7ff, 0x20, 0xd605, 0xfffff000, 0x8, 0xbe9b, 0x0, 0x81, 0x7fff, 0x400, 0x7, 0x8000, 0x5, 0x0, 0xfff, 0x100, 0x8, 0x1, 0x1, 0x0, 0x9, 0x6, 0x8, 0x9, 0x6, 0x9, 0x0, 0x773f7f3b, 0x5, 0x200, 0xf1d, 0x8, 0x0, 0x8, 0xb25, 0x10000, 0x9, 0x40, 0xfffffff7, 0x9, 0x81, 0x0, 0x3, 0x3, 0x80000000, 0x3ec, 0x8, 0x1f, 0x800, 0x2, 0xffffff81, 0xaf, 0x8aa, 0x1ff, 0x6718, 0x80000000, 0x6, 0x3, 0x7, 0x9, 0x5, 0x40, 0xc25, 0x6, 0x10001, 0x93f, 0x7, 0x401, 0x48, 0x1, 0x3, 0x4, 0xfffff001, 0x1ff, 0x7, 0x8, 0x35, 0x3f, 0x1, 0x7, 0x37, 0x7, 0x1, 0xfffffe00, 0x800, 0x5, 0xbb, 0x8, 0x3, 0x2f, 0x8, 0x0, 0x1, 0x2, 0x2f0a9e5a, 0x3673efe, 0x200, 0x2, 0x4, 0x7f, 0x6, 0x8d8, 0x3f, 0x7e48, 0xd2f7, 0x4, 0x3f, 0x8, 0x9, 0x1, 0x3, 0x7fffffff, 0x1955, 0x72, 0x9, 0x6000000, 0x8000, 0x5, 0x1, 0x0, 0x0, 0x9c98, 0xb15, 0x1, 0xffffffff, 0xffffff36, 0x4, 0x1, 0x3f, 0x5, 0x6, 0xd6b, 0x80, 0x400, 0x6312, 0x0, 0x6600, 0x8, 0x1, 0x8000, 0x8, 0x2, 0x10200, 0x3ff, 0x4, 0x4, 0x0, 0xfffffff8, 0x3, 0xfffffeff, 0x8a04, 0x5, 0x4, 0x1ff, 0x445d, 0x5, 0x0, 0x10000, 0x2, 0x2, 0x400, 0x20, 0x200, 0x1, 0x400, 0xfff, 0x0, 0x4, 0x4, 0x10001, 0xfffffffa, 0x2, 0x3, 0x20, 0x1, 0x1, 0x3f, 0xc3e0, 0xfe0a, 0x7fffffff, 0x5, 0x20, 0x101, 0x80000000, 0x1f, 0x800, 0x58b800, 0x4, 0x4, 0xfffffffb, 0x2, 0x7fffffff, 0xfff, 0x2, 0x2a, 0x2, 0x40, 0x6, 0x101, 0x9, 0xfffff672, 0xcfda, 0xffffffff, 0xb4c, 0xffffffc0, 0x7, 0x1, 0x1, 0x9, 0x5, 0x9, 0x8000, 0x9, 0x89de450, 0x9, 0x1, 0x3, 0x10001, 0x3, 0x10000, 0xfffffffd, 0x5, 0x1f, 0x6, 0x1000, 0x7fffffff, 0x10000, 0x552, 0xb7, 0x2, 0x4, 0x9, 0x1, 0x5e, 0xffffffff, 0xdbc, 0x9, 0x3, 0x5, 0x7, 0x5, 0x0, 0x9, 0x9f5, 0x9, 0x4, 0x5, 0x0, 0x1, 0x10001, 0x101, 0x0, 0x2, 0x4, 0x0, 0x66383df3, 0x2, 0x0, 0x1, 0x4, 0x1, 0xdd, 0xffff, 0x8, 0x1, 0x1f, 0x3f, 0x8, 0xf007, 0x200, 0x2, 0x4, 0x8c, 0x7f, 0x467, 0x200, 0x0, 0xfffffc96, 0xa6, 0x8a, 0x8, 0x2, 0x7, 0x8000, 0x4, 0xca8, 0x101, 0x23be0579, 0x1, 0x3, 0x81, 0xee14, 0x5, 0x3, 0x5, 0x80, 0x9, 0x0, 0x1, 0x9, 0x0, 0x8, 0x9, 0x1, 0x3, 0x4, 0x5, 0x1ff, 0x40, 0x40, 0xfffffff8, 0x100]}) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000226bd7000080000001b0000000800010070636900feff0200303030303a30303a31302e300000000008000b000300000008000100700500000000de2428bf36811851ca9271d70200303030303a30303a31302e300000000008000b00070000009dd6183da3114e4051f7e776ea5e1e793acd093708b2df049da7ca9d190b172eea152740770b30ca59d4deb7cb0f66"], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) unshare(0x48020200) [ 3311.403765] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 08:29:45 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:45 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x10000, 0x80) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) 08:29:45 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xfffffff0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) [ 3311.431771] FAULT_INJECTION: forcing a failure. [ 3311.431771] name failslab, interval 1, probability 0, space 0, times 0 [ 3311.433157] CPU: 0 PID: 15477 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3311.433957] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3311.434928] Call Trace: [ 3311.435241] dump_stack+0x107/0x167 [ 3311.435661] should_fail.cold+0x5/0xa [ 3311.436099] ? create_object.isra.0+0x3a/0xa20 [ 3311.436626] should_failslab+0x5/0x20 [ 3311.437066] kmem_cache_alloc+0x5b/0x310 [ 3311.437539] create_object.isra.0+0x3a/0xa20 [ 3311.438047] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3311.438643] __kmalloc_track_caller+0x177/0x370 [ 3311.439183] ? sidtab_sid2str_get+0x17e/0x720 [ 3311.439709] kmemdup+0x23/0x50 [ 3311.440082] sidtab_sid2str_get+0x17e/0x720 [ 3311.440581] sidtab_entry_to_string+0x33/0x110 [ 3311.441121] security_sid_to_context_core+0x33c/0x5d0 [ 3311.441730] selinux_kernfs_init_security+0x239/0x4c0 [ 3311.442324] ? selinux_file_mprotect+0x610/0x610 [ 3311.442873] ? find_held_lock+0x2c/0x110 [ 3311.443344] ? __kernfs_new_node+0x2ad/0x860 [ 3311.443856] ? rwlock_bug.part.0+0x90/0x90 [ 3311.444344] security_kernfs_init_security+0x4e/0xb0 [ 3311.444934] __kernfs_new_node+0x531/0x860 [ 3311.445423] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3311.445973] ? cpumask_next+0x1f/0x30 [ 3311.446419] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3311.446965] ? pcpu_alloc+0x12a/0x1240 [ 3311.447427] kernfs_new_node+0x18d/0x250 [ 3311.447899] kernfs_create_dir_ns+0x49/0x160 [ 3311.448418] cgroup_mkdir+0x315/0xf50 [ 3311.448865] ? cgroup_destroy_locked+0x710/0x710 [ 3311.449412] kernfs_iop_mkdir+0x14d/0x1e0 [ 3311.449885] vfs_mkdir+0x493/0x750 [ 3311.450299] do_mkdirat+0x150/0x2b0 [ 3311.450729] ? user_path_create+0xf0/0xf0 [ 3311.451205] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3311.451806] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3311.452404] do_syscall_64+0x33/0x40 [ 3311.452834] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3311.453437] RIP: 0033:0x7fe296c58b19 [ 3311.453866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3311.455992] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3311.456858] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3311.457665] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3311.458471] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3311.459295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3311.460128] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:29:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x2) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:29:45 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0xf000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3311.562473] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 08:29:58 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x34000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:58 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:58 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0xffffffff, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:29:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0xf00}, 0x0) 08:29:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) openat(r1, &(0x7f0000000040)='./file0\x00', 0x10001, 0x121) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:29:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x3) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:29:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 26) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) [ 3324.690714] FAULT_INJECTION: forcing a failure. [ 3324.690714] name failslab, interval 1, probability 0, space 0, times 0 [ 3324.693627] CPU: 0 PID: 15504 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3324.695263] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3324.697201] Call Trace: [ 3324.698089] dump_stack+0x107/0x167 [ 3324.698958] should_fail.cold+0x5/0xa [ 3324.699845] ? create_object.isra.0+0x3a/0xa20 [ 3324.700910] should_failslab+0x5/0x20 [ 3324.701797] kmem_cache_alloc+0x5b/0x310 [ 3324.702748] ? sidtab_sid2str_get+0x65/0x720 [ 3324.703775] create_object.isra.0+0x3a/0xa20 [ 3324.704791] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3324.705977] __kmalloc_track_caller+0x177/0x370 [ 3324.707063] ? sidtab_sid2str_get+0x17e/0x720 [ 3324.708110] kmemdup+0x23/0x50 [ 3324.708857] sidtab_sid2str_get+0x17e/0x720 [ 3324.709860] sidtab_entry_to_string+0x33/0x110 [ 3324.710934] security_sid_to_context_core+0x33c/0x5d0 [ 3324.712140] selinux_kernfs_init_security+0x239/0x4c0 [ 3324.713338] ? selinux_file_mprotect+0x610/0x610 [ 3324.714435] ? find_held_lock+0x2c/0x110 [ 3324.715392] ? __kernfs_new_node+0x2ad/0x860 [ 3324.716415] ? rwlock_bug.part.0+0x90/0x90 [ 3324.717402] security_kernfs_init_security+0x4e/0xb0 [ 3324.718586] __kernfs_new_node+0x531/0x860 [ 3324.719587] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3324.720696] ? cpumask_next+0x1f/0x30 [ 3324.721587] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3324.722681] ? pcpu_alloc+0x12a/0x1240 [ 3324.723598] kernfs_new_node+0x18d/0x250 [ 3324.724545] kernfs_create_dir_ns+0x49/0x160 [ 3324.725572] cgroup_mkdir+0x315/0xf50 [ 3324.726463] ? cgroup_destroy_locked+0x710/0x710 [ 3324.727572] kernfs_iop_mkdir+0x14d/0x1e0 [ 3324.728536] vfs_mkdir+0x493/0x750 [ 3324.729366] do_mkdirat+0x150/0x2b0 [ 3324.730214] ? user_path_create+0xf0/0xf0 [ 3324.731194] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3324.732411] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3324.733610] do_syscall_64+0x33/0x40 [ 3324.734473] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3324.735668] RIP: 0033:0x7fe296c58b19 [ 3324.736531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3324.740794] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3324.742570] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3324.744233] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3324.745883] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3324.747538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3324.749185] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:29:58 executing program 1: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0xa, 0x0, {0xe}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x3ffc, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000280), &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x15, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010026bd7000fddbdf250100a3f76dc4bc5844c4ec0000000000000c4100000014001462726f61646361f2cc2e08767592cc8730953351"], 0x30}}, 0x1) r3 = syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'geneve0\x00', 0x0}) lseek(r0, 0x1, 0x4) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r4, 0x1, 0x6, @local}, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRES16=r3, @ANYBLOB="2dcadbce1e98ace8da0b4dfec1f216461337bcd377ae8319be7dd63193f293a9864d5901d97776f5aea393a769f386f38fdcf7b5cae7ca2d1efcf542964995b5ec193128d1578333cb4d78d81441041bc4cbc14e5e8a001ccada686954329b7ec11f6967b95ff93274f1fdec7205b0f379bca9e23c137f904794ddacb808b5844bf86ac331e67c3bd6c1036702a1e873350d52d3a48437a0a395d0f1c34f6a71aedc6a2fb40409d04523d5a010cda5"], 0x100}, 0x1, 0x0, 0x0, 0x4044084}, 0x0) ioctl$HIDIOCSUSAGES(r2, 0x501c4814, &(0x7f0000000880)={{0x2, 0xffffffff, 0x6, 0x7fff, 0x5}, 0x332, [0xffff, 0x48, 0xda64, 0x4, 0x2d3c4c9e, 0x10000, 0x200, 0x1000, 0x0, 0x5, 0x1, 0x80000001, 0x1, 0x9, 0x4, 0x9, 0x4, 0x1, 0x8, 0x4800, 0x1, 0x4421, 0x200, 0x4, 0x4, 0x6, 0x946, 0x4, 0xffffffff, 0x6, 0x200, 0x3, 0x1000, 0x4, 0x7fffffff, 0x2, 0x2e8f, 0x10001, 0x80000001, 0x3, 0xce0, 0x10000, 0x70, 0xa687, 0xa23f, 0x6, 0xfffffffe, 0x8, 0x5, 0x6, 0x9, 0x5, 0xbd, 0x3, 0x5, 0x1, 0x20, 0x400, 0x1, 0x7, 0x10001, 0x2, 0x7, 0xffffffff, 0x7fffffff, 0x7, 0x9, 0x5, 0x1, 0x6, 0x10000, 0xffffffff, 0x5, 0x6, 0x7, 0x100000, 0x3f, 0xbc, 0x6, 0x5, 0x6, 0x1, 0x0, 0x1, 0x7fffffff, 0x9, 0x7fff, 0xfffffffd, 0x80, 0x101, 0x7, 0x8, 0x63872330, 0xffff, 0x20, 0x2, 0x6, 0xd758, 0x9, 0xdf40, 0x278, 0x1, 0x7386, 0x5, 0x401, 0x4, 0x6, 0x629, 0x4, 0x800, 0xd0c9, 0x1, 0x4, 0x0, 0xbf, 0x7f00, 0x400, 0x8001, 0x7, 0x8, 0x9, 0xfffffffd, 0x4, 0x3, 0x3f, 0x4, 0x7fff, 0x1000, 0x7f, 0xef1, 0x3ea30f17, 0x2, 0x7b, 0x3ff, 0x7ff, 0x20, 0x9, 0x3ff, 0x9, 0x7ff, 0xffff, 0xc0, 0xf95d, 0xe50, 0x4, 0x7ff, 0x7, 0x4, 0x3, 0x81, 0x4, 0x9, 0x3, 0x1, 0x401, 0x2, 0x8, 0x7, 0x8001, 0x5, 0x9, 0x7d1c, 0xcae, 0x4c, 0x4, 0x80, 0x80000000, 0x1, 0x7, 0x200, 0xe3a, 0xa3, 0x8, 0x5, 0x400, 0x1, 0xcc3, 0x9, 0x1, 0x3, 0x40, 0x6, 0xffffffff, 0x9, 0x8001, 0x8, 0xffffffff, 0x1f, 0x1, 0x27dd, 0xfffffff9, 0x7, 0x5a1, 0x0, 0x6dfb, 0x94, 0x400, 0x40, 0x109b, 0x3f, 0xe00, 0x7, 0x7, 0x200, 0x2, 0x7, 0x7, 0x5, 0x6, 0x0, 0x0, 0x1c, 0x800, 0x80, 0x1ff, 0x8, 0x8, 0x9, 0x8001, 0x81, 0x3ff, 0x3ff, 0x1, 0x7, 0x1000, 0x1, 0xb265, 0x7, 0x31, 0x5, 0x5f, 0x72, 0x2, 0x1f, 0x8, 0x7c3, 0x2, 0x3ff, 0x1, 0x3, 0x0, 0x5, 0x43, 0x2, 0x1f, 0x0, 0x7b, 0x4, 0x8, 0x0, 0x5, 0x7fff, 0xfde, 0x3, 0xfffffffc, 0x81, 0x1172, 0x1, 0x2, 0x1, 0x2a7, 0x7f, 0x4, 0x8, 0x5, 0x6d0, 0x7f, 0x1f, 0x800, 0x8, 0x7, 0x3f, 0x0, 0xd, 0x101, 0x7, 0x1, 0x3, 0x6c7, 0x0, 0x8, 0xffffffff, 0x3, 0x1, 0x9, 0x12, 0x1f, 0x0, 0x20, 0x1, 0x28cd, 0x8, 0x9, 0x2, 0x80000000, 0x1, 0x80000000, 0x1, 0x3ff, 0xfffffffc, 0x2, 0x9, 0x1, 0xffffffff, 0xa6f80000, 0x9, 0x400, 0x2d, 0xff, 0x9, 0x3, 0x2, 0xfffffc01, 0x14, 0x0, 0x1, 0x9c, 0x101, 0x6, 0x800, 0x9, 0x200, 0x100, 0x401, 0x0, 0x2, 0x6, 0xf72, 0x4, 0x6c, 0x7, 0x4, 0x1, 0x100, 0xfffffea5, 0x2, 0x0, 0x3, 0x6, 0x8, 0x3, 0xff, 0x80, 0x4, 0xfffffffa, 0x3, 0x9, 0x3, 0x20, 0xcd9f, 0x0, 0x553, 0x6, 0x10000, 0x3, 0x7, 0x10000, 0x3f, 0x64b7fefb, 0x7, 0x3, 0x6, 0x34, 0xd8, 0x6, 0xd0, 0xdf1, 0x4, 0x9c, 0x836b, 0x7fff, 0x7, 0xb1d, 0x8001, 0x1, 0x9, 0x9, 0x8, 0x2, 0x1, 0x2, 0x8, 0x7, 0x1ff, 0x81, 0x0, 0x40, 0x101, 0x1, 0x7, 0xff, 0x7fffffff, 0xd19, 0x7fffffff, 0x0, 0x7, 0x8, 0xa072, 0x100, 0x2, 0xf9d, 0x0, 0x9, 0x80000000, 0x8, 0x7, 0x9, 0x6, 0xbb67, 0x29, 0x6, 0x0, 0x3, 0x9, 0x0, 0x9, 0xd10, 0x6, 0x6, 0x80, 0x2, 0x7, 0x7, 0x8, 0x0, 0x10000, 0x423a916, 0x50c, 0x5, 0x80000000, 0x2, 0x4, 0x5796, 0x0, 0x3f, 0x9, 0xffffffff, 0x5, 0x80000000, 0x2, 0x475, 0xfffffffd, 0x4cf, 0x7fffffff, 0x8, 0xa1, 0x7fffffff, 0x2, 0x2, 0x1, 0x3, 0x10, 0xffffffff, 0x20, 0x20, 0x9, 0x3, 0x7, 0x1f, 0x2, 0x8, 0x7ff, 0xfffffffe, 0x9, 0x5, 0x1, 0x1ff, 0x20308a4, 0x7, 0x8001, 0x2f, 0x4, 0x5, 0x2, 0xad, 0x7, 0x6, 0x0, 0x3, 0x2, 0x1ff, 0x4, 0x1, 0x7, 0x7ff, 0x7, 0x0, 0x2, 0x1a, 0x0, 0x4, 0x7000000, 0xffffff48, 0x7, 0x101, 0x0, 0x0, 0x6, 0x6, 0x6, 0x9, 0x471c, 0x80, 0x8, 0x200, 0x13, 0xfffff1be, 0x3, 0xe3d, 0x0, 0x10001, 0x5, 0xe870, 0x6, 0x100, 0x49, 0xffffc65e, 0x6, 0xffff, 0x8, 0x7, 0x8, 0x4, 0xbf, 0x7, 0x6, 0x7fffffff, 0x129, 0x4, 0x9, 0xffff, 0x0, 0x7, 0x80000001, 0x1, 0x3, 0x7fffffff, 0x0, 0xffff, 0x80, 0x9, 0x7ff80, 0x3, 0x72, 0x400, 0x0, 0x8, 0x10000, 0x800, 0x2, 0x80000001, 0x7fffffff, 0x400000, 0x1, 0x9, 0x7, 0x10001, 0x8001, 0xffff2e3f, 0xa9, 0x1f, 0xf3, 0x0, 0xf7f, 0x40, 0xff, 0x6, 0x4, 0x1cd, 0x800, 0x8001, 0x1, 0x400, 0x10001, 0x2000000, 0x3, 0x8d, 0x3, 0x6, 0x5, 0xbc7, 0x9, 0xfffffffb, 0x2a, 0x92f7, 0x4, 0x8001, 0x27, 0x9, 0x8, 0x1, 0x80000000, 0x48000000, 0x8, 0x5, 0x6, 0x0, 0x10000, 0x9, 0x80, 0x1, 0x10000, 0x1008, 0x6d8674cd, 0x3, 0xb19, 0x40, 0x0, 0x9, 0xc00, 0x4, 0x0, 0x29cf5dc2, 0x8, 0x7, 0x3, 0x12, 0xb8, 0x9, 0x80000001, 0xf, 0x7fff, 0x2, 0x7f, 0xffffffff, 0x78, 0x6, 0x6, 0x7f, 0x7, 0x1000, 0x3ff, 0x7f, 0x80000001, 0xe, 0xfff, 0xf0e, 0x0, 0x3, 0x7, 0xfff, 0xc000000, 0x2, 0x8, 0x0, 0x3, 0x1000, 0xb79, 0x100, 0x0, 0x7, 0x0, 0x6, 0x5, 0x2, 0x7, 0xffffff56, 0x0, 0x400, 0x0, 0x22fabdb9, 0x6, 0x7ff, 0x9, 0x3, 0x2, 0x7a, 0x88, 0x1000, 0x400, 0xffff, 0x9, 0x0, 0x4, 0x4, 0x80000000, 0x5, 0x80, 0x5, 0x7, 0x7fff, 0x6, 0x5, 0x9, 0x3f, 0x8, 0x9, 0x8, 0x9, 0x7f, 0x4, 0x1, 0x8001, 0x69, 0x7ff, 0x1, 0x5, 0x1ff, 0x3ff, 0x1, 0x5, 0x2, 0xc62c, 0x1, 0x6, 0x0, 0x6, 0x46, 0xffff, 0x8, 0x8, 0x4, 0x7ff, 0x20, 0xd605, 0xfffff000, 0x8, 0xbe9b, 0x0, 0x81, 0x7fff, 0x400, 0x7, 0x8000, 0x5, 0x0, 0xfff, 0x100, 0x8, 0x1, 0x1, 0x0, 0x9, 0x6, 0x8, 0x9, 0x6, 0x9, 0x0, 0x773f7f3b, 0x5, 0x200, 0xf1d, 0x8, 0x0, 0x8, 0xb25, 0x10000, 0x9, 0x40, 0xfffffff7, 0x9, 0x81, 0x0, 0x3, 0x3, 0x80000000, 0x3ec, 0x8, 0x1f, 0x800, 0x2, 0xffffff81, 0xaf, 0x8aa, 0x1ff, 0x6718, 0x80000000, 0x6, 0x3, 0x7, 0x9, 0x5, 0x40, 0xc25, 0x6, 0x10001, 0x93f, 0x7, 0x401, 0x48, 0x1, 0x3, 0x4, 0xfffff001, 0x1ff, 0x7, 0x8, 0x35, 0x3f, 0x1, 0x7, 0x37, 0x7, 0x1, 0xfffffe00, 0x800, 0x5, 0xbb, 0x8, 0x3, 0x2f, 0x8, 0x0, 0x1, 0x2, 0x2f0a9e5a, 0x3673efe, 0x200, 0x2, 0x4, 0x7f, 0x6, 0x8d8, 0x3f, 0x7e48, 0xd2f7, 0x4, 0x3f, 0x8, 0x9, 0x1, 0x3, 0x7fffffff, 0x1955, 0x72, 0x9, 0x6000000, 0x8000, 0x5, 0x1, 0x0, 0x0, 0x9c98, 0xb15, 0x1, 0xffffffff, 0xffffff36, 0x4, 0x1, 0x3f, 0x5, 0x6, 0xd6b, 0x80, 0x400, 0x6312, 0x0, 0x6600, 0x8, 0x1, 0x8000, 0x8, 0x2, 0x10200, 0x3ff, 0x4, 0x4, 0x0, 0xfffffff8, 0x3, 0xfffffeff, 0x8a04, 0x5, 0x4, 0x1ff, 0x445d, 0x5, 0x0, 0x10000, 0x2, 0x2, 0x400, 0x20, 0x200, 0x1, 0x400, 0xfff, 0x0, 0x4, 0x4, 0x10001, 0xfffffffa, 0x2, 0x3, 0x20, 0x1, 0x1, 0x3f, 0xc3e0, 0xfe0a, 0x7fffffff, 0x5, 0x20, 0x101, 0x80000000, 0x1f, 0x800, 0x58b800, 0x4, 0x4, 0xfffffffb, 0x2, 0x7fffffff, 0xfff, 0x2, 0x2a, 0x2, 0x40, 0x6, 0x101, 0x9, 0xfffff672, 0xcfda, 0xffffffff, 0xb4c, 0xffffffc0, 0x7, 0x1, 0x1, 0x9, 0x5, 0x9, 0x8000, 0x9, 0x89de450, 0x9, 0x1, 0x3, 0x10001, 0x3, 0x10000, 0xfffffffd, 0x5, 0x1f, 0x6, 0x1000, 0x7fffffff, 0x10000, 0x552, 0xb7, 0x2, 0x4, 0x9, 0x1, 0x5e, 0xffffffff, 0xdbc, 0x9, 0x3, 0x5, 0x7, 0x5, 0x0, 0x9, 0x9f5, 0x9, 0x4, 0x5, 0x0, 0x1, 0x10001, 0x101, 0x0, 0x2, 0x4, 0x0, 0x66383df3, 0x2, 0x0, 0x1, 0x4, 0x1, 0xdd, 0xffff, 0x8, 0x1, 0x1f, 0x3f, 0x8, 0xf007, 0x200, 0x2, 0x4, 0x8c, 0x7f, 0x467, 0x200, 0x0, 0xfffffc96, 0xa6, 0x8a, 0x8, 0x2, 0x7, 0x8000, 0x4, 0xca8, 0x101, 0x23be0579, 0x1, 0x3, 0x81, 0xee14, 0x5, 0x3, 0x5, 0x80, 0x9, 0x0, 0x1, 0x9, 0x0, 0x8, 0x9, 0x1, 0x3, 0x4, 0x5, 0x1ff, 0x40, 0x40, 0xfffffff8, 0x100]}) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000226bd7000080000001b0000000800010070636900feff0200303030303a30303a31302e300000000008000b000300000008000100700500000000de2428bf36811851ca9271d70200303030303a30303a31302e300000000008000b00070000009dd6183da3114e4051f7e776ea5e1e793acd093708b2df049da7ca9d190b172eea152740770b30ca59d4deb7cb0f66"], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) unshare(0x48020200) 08:29:58 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x80000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:58 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000002b40)=0x81) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x200) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) stat(&(0x7f0000000140)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_unix(&(0x7f0000002b80)='./file0/../file0\x00', &(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00), 0x804000, &(0x7f0000002c40)={'trans=unix,', {[{@msize={'msize', 0x3d, 0xfffffffffffffffe}}, {@cachetag={'cachetag', 0x3d, 'net/snmp\x00'}}, {@access_any}, {@loose}, {@version_9p2000}, {@cache_mmap}, {@posixacl}, {@access_uid={'access', 0x3d, r3}}], [{@obj_user={'obj_user', 0x3d, '},]'}}]}}) syz_mount_image$ext4(&(0x7f00000026c0)='ext4\x00', &(0x7f0000002700)='./file0/../file0/file0\x00', 0x5, 0x4, &(0x7f0000002a80)=[{&(0x7f0000002740)="84b055c06636b109283c761bc21178d1df45b2e57d073e2b72305c549b6117b6610c6c337cbad76be471fc736cc3fc9c56a1a98453cc635c645799eecdfa9dd282c1beb2fce328b9c05153c99fc03740db2680607763336dc9609c95ab944743fe8cc22d8798f82ca55756fff55b421c6d87f389a9d3ff0ead8e9a76b08ef4307647d58c18de6fa25bdc3ee0a14dd173c698177a4d7d113ebd6b7dce27ccfc49dfc300b428fed477a0c10a58787ffb1b3b6596b65e41bb2b7d50889ababb0e6b52f3b98726acc974273626a77bf943c0c3be60fca9aa98fa613a001289faf4500582588aa6668b644c", 0xe9, 0x1de7}, {&(0x7f0000002840)="e114c7614f5de32303d90d4e3c5e9334c786fc5f58324567ee3b839655def57e36e6165a3fa9f713f969d8b2f9ac5493dab104aa0d6f5ca5c68f0ead9889e995306c7c75beee8dc22ab9bfacccc565a88897140048b3e8d7410dbe31c72fd81d177d8ea22041f147c5031cedf60f78326d4ddb1230f18dfabc2eb4366e5ec25d96c1d6c1327e3d476ec5e60c2f4667173bfe43cd75b1191d76628f1b375798fa2159e0dda448e677410a5578cfcc4b717b02caa9038ebd26c16a8335d944c97947a67f28", 0xc4, 0x9}, {&(0x7f0000002940)="4f24eed262ed811c76ef99d730e24b98904a5b1f951b248344063ff5ce92853454808acc3820be62a32519e56e942ae0e74eb3e1d166a13e6dd76f3a202835ca55cae7fe0dcbd1c6ac6c669cb71b8834d897cd12efe3c971866cd4bb9914064b15bbe4478139e5f480c07ed86d2ed5dc49dbb9a18b2bf21ae46472e85dc99771fd69458b31700f3d5d90a4ad93912d53aa1e44c5f347074a0be8b6546a4709f742e11df03e54c9", 0xa7, 0x8}, {&(0x7f0000002a00)="3dd5fb32a9f5f639ab794d438d45285cd4e41543da913f176d2dba332ef1aa0a6a613dadd9cbbbe39f5ba7240e9fe617133511dcf50a94dd4912a02ff7118537784b319f502cc2d5af7094099f2469ba08ae81c19c71501140", 0x59, 0x7f}], 0x44848, &(0x7f0000002b00)={[{@journal_dev={'journal_dev', 0x3d, 0x7f}}], [{@dont_appraise}]}) syz_mount_image$nfs4(&(0x7f0000000300), &(0x7f00000003c0)='./file0/../file0\x00', 0x5, 0x4, &(0x7f0000002640)=[{&(0x7f0000000400)="33e77af8c0a0b407e06a4c038f5af92420d823cb48018db8c33246b64ec66f30d8bfe4fb0ba05c8f58234ca7ed57e15ce507ecd55d8f8927fa139e795345044ed0c123adbd6b0311434b02870f5b87435880afe8ee4be793192cb22412bf9cf61e0ef763e37cc8fa7ccb70850baed5e23a1d18cf7530189952c967866ac52cc502e34dcc5450c9b879258202d5dd21c3", 0x90, 0x69ffbbc0}, {&(0x7f00000014c0)="9ea1a509c3be6e1262d2c56beec2846670d265fbc1eafbdf3ecde45c481c64c677750fef2af01a88e96ff3545298916436a814cc2ca5eff53f2cdf6be5a8fc2fe495370e567694af8b28b75c741698c145b9cb9e6039e7aaef4666e310de59ab8bcf8e2486e056bfb722", 0x6a, 0x8}, {&(0x7f0000001540)="a8146622841923dcf5df6a2ad4026392d658ab46133bdb2d62b21e15e6b8", 0x1e}, {&(0x7f0000001640)="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", 0x1000, 0x3}], 0x1002000, &(0x7f00000015c0)={[{'{'}, {'vfat\x00'}, {'cgroup2\x00'}, {'net/snmp\x00'}], [{@obj_role={'obj_role', 0x3d, '&*'}}]}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000180)=""/203, 0xcb, 0x0, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) unlinkat(r2, &(0x7f00000004c0)='./file0\x00', 0x200) 08:29:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0x8100}, 0x0) 08:29:58 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x400300) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0x9a02}, 0x0) [ 3324.781391] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 08:29:59 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:30:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x4) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:30:11 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0xf0ffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:30:11 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) io_setup(0x9, &(0x7f00000001c0)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r2, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000240)='f', 0x1}]) io_setup(0x0, &(0x7f0000000100)=0x0) r5 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r5, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) io_submit(r4, 0x2, &(0x7f0000000200)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x3ae, r1, &(0x7f0000000400)="347a9bb541a6df4cc7b2aacacc33c9fb1fb7c2f1e0832b6273e3cc11cafaa31f4ef88c5c2fcd679f409fef61402efa818b96157086b792427028ff642d022a5f9421247eb25da330ec6e69f503f8aaf46805fed32d7194d19ff3c512cde67dee9d12592b6005e96f0ed54684053517367b7a62329c9e4c2b55a9b397e98e9b8e35bc6476bcd0398651b6b7a950217b9ac762795c3e6a45bf558130b5ca74e5b3fc496438c5eddf53de705387d1ee4171e15051fe13b93e132cea40e61a1c42c2b0abc1915cc3494421e78c8b52c0ed1b1cc675acf1eff195157ba3f191d8d7cde9de3d0e9250ed118e217eed52f2d81dd1a2ee191b4ddf", 0xf7, 0x80, 0x0, 0x4, r5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x3f, r0, &(0x7f0000000500)="ce9f9929eb0d524396efcbfaa6fc9beffe319c9ae6a20c8681ae44abec4c660b3753c8463653eaaeacef254dd820bfe1bf0269050259bc5e3d4640e95a0f86cfa1c44cb2eb36ad6fe13c5a8edb767d2bdecdd0132807be8a", 0x58, 0x4d2c, 0x0, 0x3, r1}]) io_setup(0x9, &(0x7f00000001c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000800)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)='f', 0x1}]) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20200, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x4, 0x7}, {0x0, 0xfb, 0x65, 0x7}, {0x5, 0xa0, 0xaa, 0xfffffffb}]}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100", @ANYBLOB="0200000000000000272f66696c6530002a1c5f31f3858c9d8f75bc720d19472099c3f56cd0e3247abbc843cc9194913793b40ec47a60ed43f2e34a8690f49a33c44e4d01c8f663dfcc57c1c44952"]) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000380)) ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x560f, 0x0) 08:30:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb357b87ae67d5b00d5a28eea29113393d0e1c7391515c7ab7c00", 0x2d}, 0x48, 0xffffffffffffffff) r2 = getegid() keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000300)=@keyring={'key_or_keyring:', r1}) keyctl$chown(0x4, r1, 0xee01, r2) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0/../file0\x00', 0x27, 0x5, &(0x7f0000001500)=[{&(0x7f0000000140)="761c264c56e96afb07ec73eb463ad4b77f412da84d760e23e51c65ef7881efd6aba735df716c1c83782ec1478a9482d6bf5f73add376de143397990d1e1e8d249de4793d866317f73fd8f75526f9ce776b05d3126ea6dc642c7d3343ca898867b480d9ddc5eb939e730083b0847b41b26ce40a899949e869d447726a3f9faa76e9581233ec6b851063921cd2a690287f6e38768fe8b56a8dede2e01eb4668377ae3666a000916eb29ffdb9e77268", 0xae, 0x5}, {&(0x7f0000000200)="3387ec6aeb08cae14d535d9d40b2d88c6c7be192cbcaefc44b24555f8c4e1ad22d2f1360e43e1f6450f1f0bad55889ab3a03e4da0969cc15ab237e93c019a3d58bc4e9f6a0e18167aa636c685aa0f2d7f118781feb165cb465dcd99cb88ac34bf58ebaae842b", 0x66, 0x80}, {&(0x7f0000000500)="48bc782f431ba25589da60a2690c68bb6a15757e9f169ab26fca117870d2c9fb1371c6ba63ed098f2861dd8f058edef342457e10669cba628ea4c5817c2ffe28be88d038511e0de4bfcfc04bc1df52f400daf411b9eb560fb4b88c2c27fa080d23b2a0587bf49ace4ca13c413d32dbaf54bef4b011ed3704701beb7aac672a208a598f9244d8a0432d24b39c896ae4c3dc976330fc9d1bbe9bfab294a442ae7ce526fc99c22e2238301de73ae84e6ee23e1992f4775be704bea52d6e3fc49b502d2f1766c3ab563b0d38f2513091648abcaa1e029bc0c8d03553d30291af68f0908683068d15081ad642ac962bc7e9e37742f3b7725723660ac99836245d8abf914410a082b700d3e064cb4a5ea56ac2f7e4d3139080e8028db9953c0fdb8e3f4c7865228eaa7aff3076a4acca9cc292cdffdfdc5ae92b712a071054ac2cda35dcac4186fcda88019c625b44c3aad74c9ecdacb654b60d8565afa66bf3f6bfc4601d5d6d407b32e1a4378f4c8b9aa8db8401c6d4f01402b9ecd9c5d926b77062126bb6348909425efd3e925680807998c767bdbb0f781c6accb68b671c6347a9ae7035d6317f4e9f39ddad1f79aecb47c6ce90d1e1359962d7db94d092fb815a4dc42af587942e8e94e7259ca7b653840697bd0449a4c90ba291b0a1879631641b2a5dbe0055a83b39c39d763064cccf231873eef296e0e9682a9f4ad6dda07550f22486833c46e8b22e1ff7c373785dedc0587185c0d76523d254861fb72e16fcfbc8ad1dfa4dfeadb13729fd297e64ca11615bc2702ce2aa93e20d076b8e9983e577fec77145dfd606e1ac0d36f0262b6a67f00b28f97da8067c684f32be200817fcf0d1f60b9760c6510f785bb229d9d69cfc83da2da2acb6b0ff1e5595bc4c4bbc29c1f9a42a1bca69cb6704aab3a8917c1cd1436cd102c2c00f867ea83721979f0eda1c5cdb3a8d014d476f574883a382efc1888f0258c609d41981bceef967270cc57c03e604131dd2036eaad61942753ce2be989ea97f62d103d2d7dedd952902ddeae7f72f552d3a0c6c590dfc7f5b595b1b134436eb5741b8dee1b2f620b1351d15ce10074f65889845c0de8ee2e79be26a40058ddf9d5ebb5ec4a58c04271b1ddcfbe49d162385178342ebc11bfd646ee5ca825281b3c9d8651a0feb4d17ef71cb8a032457290dd4f14f06dc779de956ebd850a96e3d060a97f5816a3b0be9a80cfbdae27451db0dbaf5b604db2b8c70b9f99950f50361ea079afea13ff82aa6fed95e1850637b9ce1e862bb2c271712ec6bce322b1f15f841398660e91778f7594508345e0784b95dcb4705cd4df4c5e7a2c28ae0f9f4440733b866e010c26af469343ae812956fc15c40f0bf3b1721c735f0c0c9ec438974d1bd42cf77fe46251d96dd3cd6e2527c6b9e459b50397afa54b4adbbbd4a9d5415087e32558cd8aabb4d22e40bd1ef8426a78187f1936bb677a6eb9b20f7831aa00ea3b9d76e3010f9d5ecb27b45140fe2ca3c4a0970bfe6e79d764db7aa1b48e85e151ed9feba17210346eff8e42da5353d275e3b098651b5f22dc3a100eb74669ff800fd20269cd48a7ec966007a82f4e242c3ad90aa7f711fac37fb70933cd0f2b1cd894886beb8a64a871f008b696c640f039bba9bd3e084f1fa5d6be62a7b6b48332aef8958cc41d513d82c4ce86764f1c7d923a1f0d7ee0fb0c656b7787ed35e01be1eebd07f0289dcef7250f6310d8f02dd949c989715eaeae731ea047da98cace9fd11c5f251bb299554483327794ebeec4842b2f61f599e4b5c61fab48c36e4aa2a56d7d58f41af0804b9f59c99ab0021171568ad14142cb82552ac731f0ea893b70f6f9c7bb9096d24662ef0b95118f5ba2dc9aea2544f847e17ecedc05f664ce65aa6dd17f3a387c3177556e4dd70773519cd5c57ef9e30b1c30e572c5ed994591e5561bc42924b3945ac53f581e09ce08b67a1616a1c28215e3e2781e76adeca6ca6640e35d0bc12f4d527910daf32f82e51400a28fe51f766a57957b226f20c8625d605db1b08325c353058e3e51d81db61a876b01219e2c4416ad2a0fdb1812f9ccbb962608cd310ac2e82ae898e2fd8e46acff88c3eda7aeaf5d24c872d849276f6af664e658313d26739d5b3c4fce97c93257cda3f8d9682ba87626636e3a187bb2a7d602205ba2c41b95a83d86f12f899606f3ba34d0cedad037abbc28c0c7e9ce7fc26c127e7aeed63df4ac0b47f455f5c45a64cf79837ec3288c8173bdf4a5f8cdf2b31d6fb828a325bafa0c6e0af5b8bd3b0ed25172c7dd41632fd50dfd41b7e3bfb6f2035e9b6d9b3506cff0f95fb4d58628acf53e6bbf7ae594ecdf0843c8e14e6623d31410864ccf0db9eb05444da5ced7bd85bdc333cafe7adec0f4f5587f921e37e9c9be3a1b6ee30795e3b1804c87c1cf4a6c3d52959e105431dafec273f16129365b924ac954d8d5c00a1bc77f15dd11f0fe19edf4f38d215ed918bb557178dca44e64f05d6e842c85773fae8a9c3b94cae8e3eb06c00a34d55b6bd693955068b75fde6ac4f3c89d8d47975cadb43b6d97d38ff9fbb19a2c44091fb233d5eadf3433dfa3c05584f5f25a39487d1e458ac2c65587910c947d17972961b86dafb952ac0b03af0741059edd669b82b2a8792d1b00fc01705daf69db63f9c3adcb5a71ab4c628d4374912b88ce92faaf420c1cda909c48246077c6eac11b557c686f1fe439f0c10a4147b969f2691dd996579291f0268cb18d736458e6c377de3b1924db1c010ad261dc6b96ca744252ad2a68df4c7427b4a474ecec0f75b9713b562a0fab8560af5c191abbf115744673871d28d3a0b177418fa0264aff148ad70c5f53672ac8f823000662e9bb3b3a80ff370bd3e022cc9f4c8ee2d78d504b2f51681dfe6229689817faffe2c6e7b5338cbcddfd087a901bdb9749f32d72b6817c786abbaae294a487ba8aa61f4b07b3927de391047c433dce2d51b52fad637686b7f949e2e2dd5c5304d0d9713f5c5679117e54713a02757b2e0a801e7184d3042bf126a6944f075ecef3717aed7de29c194c8b841e397c456905574e5566c1c0770ba0ce80f42fb86c1ce08575ba4bd1f29ea7627d427dff4c6f52b06bc0f7061fbb3525e176bdfb8e6a01a3fe86b08c9bfca86d643aa77fc9bd5ebe33f944b088f43cd7b92e74a57e4c90d50bd21e309485bf167b058c3b115e84e263ea6a469b3daf106fcf212c84e473e0cdec386cba2287322933c6e4050bbb594d49626ac8f535ef4f05c4253030632415220a69cd956093f049ccd9f2e9c256c848ee79d84f18c66d5365dbe5a31162335fd8826a8248b0ae6fb5f350c335fb80c3d457d0e2d3ee62f07fb3456cf04fcbe8f8316fabd440a2ed0221be70b76d168fb51dd8efe91974f2a002b2c5573dd2acf27ad7abeb22582e7b4b57eeb5b540d85d26dfe8e05be9933f6e9f925dd46c9ae18486cc9331db1561475f858e98f315639e8dfd924679ce581cdca2fad563144a241110b746964f2627d6e253c541b9d12237d85f35b0e8dbd2f89840495d7605618b1980850c29964b803f57e65174413e14ce768010bc5d459513c792cbfa320cd89b542bd1fd3295857ba7fbcef9055d37d62392049b00328acf700dabfa73db4a05796d93f38aa1013fb62c9540782479691ad1335c52d795f40f46ad4bd00b92abffda3daed315f230a225fd1a5c27d5d1ad01b8d17fcc663a7e713601b31b53a4d306aaf24cfe962cfa508aeb4a605f6e0e0da93b050d2191479f224a0c71ebc5f853b980de474ca5e2d9e454196ad59356ddb6fcb625d5fdfdf0bd046acb0a60fd6caf17615cb054b1fb37d311a97dd0bf760f277876283906bdf5499e750ce26edc58ff4986176cc16c6a4618661537b75b95ad9df51b485d41433445fa7ec36c7d6f2d3e34e84fd6a5a02f367c7d2be811792bd2026870c4cda09d4633ccbc30f3d29eab99a4f7c42363b2f041b81db145a28fe8b0ff871fa6728f859149e04397dcbc0ad9ffd97da406f0aafcdf76ed228c1898f8eda214c20eb3810cba388f95e6cf8774261ad6632117827b3931cc5f996edb67fa762160122577165a6d03c6457fb574c81193cbcaa87c7c009994120c7f277d3f09410f72854507f5cff20e47661507f6f3f80fe810b3d4b1049c55b72f5cb3ea6e182639bcd683ed1e44054d7cf006f91bf98eb4816c4bbdee5f505d1ecaa6c9b0947dd42014814552115263115926e6dfa61d4dba676764f60be3cf08f1fc4b7e9a94195cb0e012006a1f8a00f8e5d3c0fdae19906b15e36f1f4600ae9bcdc73614333091b3cd49005db336da733187e719b7e3142bd4216f02aac22aab884cafcd3737bdd711627f645784c8b7bfa3535c615053b1cd79a915f480a88ef3623012db2a0c6226166ffbe94c22642938458866364fe195db30b8a04234052c87edbd925d53146b069d6d9e5ccc0450e3a261e0691772beec8e0f086145b23044382f4fc64e73b6817a073805971028acf525d65ffab9be7110a1256aaa3daafbf63a954bb81c5680a0ded9f48a355ee48c84053085e4bc559a2ffcd6bd395641778d3f8077accff080e4fa52aa1d60c3b4012f591e9073ef535fca9d681e7ac82e7ed8575a2c433d5d59b5649d404ea23e588ef832c7867378de210c3036cee3d1b1baa2846b6586d0cbce5d61fb4c2289215c16524b319df8765cdabf409b6a9ea51f01818938b6903b5baa0bb0c2e50e1c377d4013fc4919caf9f512cdc3080094afa5a64e2080d6168521ceed674348d5c30a6088df41fe7165152e24cc99fd1328f37c83be420c248b3efdcdba145c0121555da4dc88b7d3102e358d03e80348d46ffeb8ccaf2025dbb46c2fa219c1dc2630614b532d7e9c8350ae900dcab1b72489d10763e6f0a687f4e21e63c5d2595bbcde2345884d007848dff23fc505fca63ab79c4f195960657c9c31f177d54357d80cf3ad6984a2f1797a274c6a04b383b4ae268633d1619720b260057eb03e56e91b2edd57d9a300d4c1512aacca54824bdeb6b4a4c77e2b9dfc373fdaed50764c1ec02953d63128dd2818c50cc6f7058c3ad39083bf5ad96e23e6377b00abe2c968f8fe3eb283fa549c080c318fa225943e30360cb329450afdf8918405aeae4000cc318fa01c2733bd8cb49d678c1664be2dc1dfafb1b83f985fbcb3b3a4f63d2f50a51d54b6e6b5da761a59e18348df3c6f074bed1f67d8d5f520573464a93821cc2265c524a684335f91d23cad0632a29751b32967e8a5b4c7c8435317ed747b66d294af90f8cbfa1ea6417364b6bec14929e2f5db5d444d20d5d226f655cdad6688cd1861c1bb2edc7639971509965bc3852760ccb89889a2c4319fdb038e6e6c9796e506cc416e5d6bfba9558a1ef561af7e26a3a79b0a1045b730df9518308b1c4ed4c454d8d75288a7681cd0fde8deb0ba48d083c2ea88dc791de650141caec2e3e379f8418caeae65f9e9034ce5bc365b8877e89794daaa3a8a1eaa685bb4a3aeead4357541bcec6345b05132bb7643025b6e79993f09bf3dceb3a278afefcbca560c9c678033ca4b58c2b687c668074558a050f2669d6b1866190088f328b82106e7147aa698fd30fbd41a4f76424cf88c4a466571aaa2dab80fa766bb71e950348e8d06da8161c5568c1b69f829b8eec92acfe699b423025294ca14639dc1e1c605f992c14108d92b0b6654767a15b8e2f4262ddac0e63815cd556ad1aef0f3b3f42d5728877d85e8b464d485d253884d6cfbb", 0x1000, 0x9}, {&(0x7f0000000280)="268324af9fc8e9efc779d39e55bb3d70a5ca47fa475bf3a40e10ad8ca6deacff4ede18638455d4a4a0dea36f2d12ca19b0e3a92e2a4558aaaaab1821d5e9450c22e6bc304000e994ca9f8cf87749f1c5", 0x50, 0x8}, {&(0x7f00000003c0)="67231bc7197c9b3cc0c7ff2d4da2933744b91a1f4067634c43fdd5c30738b253f6ac04db7bedae74b9c1f70c496c9c95304fcfa72deeaca9bad3ec929256b4a5be20273382d02dfaa241b1bb7d1fd14a37e03f226381a66de6465848d518911ecce15568735156a5cc94abaad470da5bfd0aa5ca41e0495ab73f6736ae9af012deedf87f1a84d4dd4338810a8dfdadd9988598d7ca322e51bfff80233621a5bac99e21ee0dac0add638e04b6876f3293638f5cd061396a31bc3c3a16c3defc7dbe339a8631c1c4219a4b7c33d3cccd77", 0xd0, 0x2}], 0x8000, &(0x7f0000001580)={[{@gid={'gid', 0x3d, r2}}, {}, {@huge_never}, {@huge_within_size}, {@huge_always}, {@huge_never}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) 08:30:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0xf000}, 0x0) 08:30:11 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:30:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 27) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:30:11 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0xf, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) 08:30:11 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x2) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3336.983529] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 3336.986303] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 3336.988191] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 3336.989771] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 3336.991578] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 0 [ 3336.992809] cgroup2: Unknown parameter '~2UتM" &kw n0{E 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3337.034221] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3337.035100] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3337.035906] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3337.036723] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3337.037545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3337.038358] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 [ 3337.043735] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 3337.046034] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 3337.047572] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 3337.049040] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 01 00 00 01 00 [ 3337.050757] blk_update_request: I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 4 prio class 0 [ 3337.052998] Buffer I/O error on dev sr0, logical block 4, async page read [ 3337.054608] Buffer I/O error on dev sr0, logical block 5, async page read [ 3337.056197] Buffer I/O error on dev sr0, logical block 6, async page read 08:30:11 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xf0, 0x40, 0x400, 0x70bd26, 0x25dfdbfd, {0xf}, [@typed={0xdb, 0x55, 0x0, 0x0, @binary="eeb0e56031754c379de9dc53fb7643180ea8944b9a5816c800eb43e9f57c040a8b2bfc7aa038d5d0f1b8355d4d878a4c4bf09b33dbefdfc5c70130d68d2ca3439a59461f829452c0bab558f68fd23e439f354d2bc7940dcf84c9715027787a89752873d21954deea0ab19656d2ea1cb427f3c210a1bbd694195c7355785a0c6093bcb73653f155c083f3e181b07ddc1ccbd8fdc0390b7afd50756056b08273a3007535e06fec1157db76e79ad68f056611ebeeb5bafe5fd323460fa53449e188b98f082bbbfe382a47ec3ff5d2652b91a5321687c7abeb"}]}, 0xf0}, 0x1, 0x0, 0x0, 0x8010}, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x20) [ 3337.057788] Buffer I/O error on dev sr0, logical block 7, async page read 08:30:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0x34000}, 0x0) [ 3337.229075] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 3337.231607] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 3337.233280] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 3337.234875] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 3337.236651] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 0 08:30:24 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x3) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:30:24 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="9c2c4f42692653af2d58cadb87192ec9c44e86ae70f863e5643de1a348551259f180d4234a8577c299e8fa02dece4b8ac183a28f92ac835e24937ccceed93102b15da4bf5a30e5f79e25bf20dab67a282fb63ffc66581d549f78a82793048627760430cbb984adf160ec885bfabf3811bace6d2468b12d11070e9503801548422ffb9f100ddf968b2bd9abe71b2729d8ee34dcd947a457b65241d6d85b6cec7bc63c751f0bbb56233335c4623d", 0xad}, {&(0x7f0000000000)="2aa0df500b01af03a3c128fa371c79b77cd1492792a0cb", 0x17}, {&(0x7f0000000180)="0c53a455445e6f1d7c7d78947ee9f7dbdc64443d3a7c0f1ba924a68cef3150c5393e80c18091d57ae743aff387d890958af804065bc0b2c3e2379f0b59e035821f179aceb4d49b5cfac2bd326dfdc1e64cf4d53456f6a0b1c6b2a89f0e5fcb6c0c6cae9fd71e9e90c7d4c1f1c35d0ca9fe56772af77faeb1b1db22b0", 0x7c}], 0x3) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/power/pm_async', 0x122902, 0x0) copy_file_range(r0, &(0x7f0000000040)=0x1, r0, &(0x7f0000000080)=0x10000, 0x4, 0x0) syz_io_uring_setup(0x4ee5, &(0x7f0000000080)={0x0, 0x806cad}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x2160}, 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000001500)=ANY=[]) r5 = openat(r4, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000002c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2, 0x0, 0x0, 0x0, 0x12345}, 0x800) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000000c) ioctl$AUTOFS_DEV_IOCTL_VERSION(r6, 0xc0189371, &(0x7f0000000640)=ANY=[@ANYBLOB]) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)="037ec052eb7052ecc311eb97be349b472124662ef4dede168d2cc6b84523e469f7de3551a997ff1a436a6a460d6c7b3b654058217932b9b4e725b61005069a94b0023b61ffa96663ecdf9beb68cbd35d7220f33536b1ffa44c6249741c19fb3b87fc119879864c8fd9e2289f682666006227", 0x72, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x3300) 08:30:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0x80000}, 0x0) 08:30:24 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x1000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:30:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0xc) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="ac62f2a6c5e29572609fa19fedbd25b7eb92788d55bbbb061a1f96d4e04ae472a1bd5f774fd1043cbb509c89", 0x2c, 0x401}, {&(0x7f0000000500)="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", 0x1000, 0x100000001}], 0x1110000, &(0x7f00000003c0)=ANY=[@ANYBLOB="73697a653d332c6d706f6c3d696e7465726c656176653d7374617469633a2c371735383838302c6d6f64653d30313737373737373737373737373737373737373737312c687567653d6164766973652c6d706f6c3d6c6f63616c3d7374617469632c6d706f6c3d696e7465726c656176653d7374617469633a3339312c2c687567653d6e657665722c73697a653dce6b393867352c7063723d30303030303030303030303030303030303033352c00b411561c2788e6e4da5422788e"]) getdents(r1, &(0x7f0000000280)=""/147, 0x93) 08:30:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x8) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:30:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x80d80, 0x162) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_io_uring_setup(0x4147, &(0x7f00000003c0)={0x0, 0x19e9, 0x4, 0x80000}, &(0x7f0000000000/0x4000)=nil, &(0x7f0000007000/0x1000)=nil, 0x0, 0x0) mbind(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000eb3818e614679307ff67dabfe22ef5cdfedb89c8f261900c73300f36156c99ac8dbeaef5516bf85cb2bbd5bea57857ad8b49625b81343e3376dc998d9da0f929116c6fa19c341995a6b71384017f1f5918d9a68d5482f156998effe0", @ANYRES32, @ANYBLOB='e\x00'/14]) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 28) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1851011, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file1\x00', 0x4102, 0x20) creat(&(0x7f00000000c0)='./file0\x00', 0xc8) 08:30:24 executing program 5: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x10, 0x42, 0xe21}, 0x14}}, 0x0) fadvise64(r0, 0x202, 0x102, 0x5) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/223, 0xdf}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/108, 0x6c}], 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000857e000000000600000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32, @ANYBLOB="0000000002000000001600"/28, @ANYRES32=r4, @ANYBLOB="000000000f0200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/25, @ANYRES32, @ANYBLOB="0000000054f7ffffffbfffff00"/28]) [ 3349.963329] FAULT_INJECTION: forcing a failure. [ 3349.963329] name failslab, interval 1, probability 0, space 0, times 0 [ 3349.966339] CPU: 0 PID: 15593 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 3349.968169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3349.970135] Call Trace: [ 3349.970781] dump_stack+0x107/0x167 [ 3349.970914] loop1: detected capacity change from 0 to 32768 [ 3349.971680] should_fail.cold+0x5/0xa [ 3349.973258] ? kvmalloc_node+0x119/0x170 [ 3349.974212] should_failslab+0x5/0x20 08:30:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0x400300}, 0x0) [ 3349.975121] __kmalloc_node+0x76/0x420 [ 3349.976146] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3349.977197] cgroup2: Unknown parameter 'aQ{d7Ap)Ywyu~P' [ 3349.977284] kvmalloc_node+0x119/0x170 [ 3349.979065] simple_xattr_alloc+0x43/0xa0 [ 3349.980038] simple_xattr_set+0x75/0x610 [ 3349.981034] kernfs_xattr_set+0x50/0x80 [ 3349.981975] selinux_kernfs_init_security+0x26d/0x4c0 [ 3349.983196] ? selinux_file_mprotect+0x610/0x610 [ 3349.984304] ? find_held_lock+0x2c/0x110 08:30:24 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x2000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 3349.985286] ? __kernfs_new_node+0x2ad/0x860 [ 3349.986335] ? rwlock_bug.part.0+0x90/0x90 [ 3349.987368] security_kernfs_init_security+0x4e/0xb0 [ 3349.988557] __kernfs_new_node+0x531/0x860 [ 3349.989553] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3349.990652] ? cpumask_next+0x1f/0x30 [ 3349.991563] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3349.992651] ? pcpu_alloc+0x12a/0x1240 [ 3349.993598] kernfs_new_node+0x18d/0x250 [ 3349.994551] kernfs_create_dir_ns+0x49/0x160 [ 3349.995613] cgroup_mkdir+0x315/0xf50 [ 3349.996499] ? cgroup_destroy_locked+0x710/0x710 [ 3349.997647] kernfs_iop_mkdir+0x14d/0x1e0 [ 3349.998614] vfs_mkdir+0x493/0x750 [ 3349.999487] do_mkdirat+0x150/0x2b0 [ 3350.000326] ? user_path_create+0xf0/0xf0 [ 3350.001287] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3350.002514] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3350.003723] do_syscall_64+0x33/0x40 [ 3350.004589] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3350.005768] RIP: 0033:0x7fe296c58b19 [ 3350.006645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3350.011905] RSP: 002b:00007fe2941ce188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3350.013687] RAX: ffffffffffffffda RBX: 00007fe296d6bf60 RCX: 00007fe296c58b19 [ 3350.015350] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3350.017013] RBP: 00007fe2941ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3350.018668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3350.020320] R13: 00007ffd88c8b10f R14: 00007fe2941ce300 R15: 0000000000022000 08:30:24 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x4) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:30:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0xf) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) [ 3350.055449] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:30:24 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x3000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:30:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x3a, 0xe21}, 0x14}, 0x1, 0x0, 0xf0ffff}, 0x0) 08:30:24 executing program 2: link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a9", 0x1f) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x8) fadvise64(r0, 0x202, 0x102, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:30:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0xf0) fadvise64(0xffffffffffffffff, 0x202, 0x102, 0x5) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)) 08:30:24 executing program 7: link(0x0, &(0x7f0000000380)='./file0\x00') openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x4000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:30:24 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) connect$inet(r5, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x444880, 0x0) fcntl$lock(r7, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x101, 0x800}) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40000000}, 0x5) stat(&(0x7f0000000340)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000580)={'ip6gre0\x00', &(0x7f0000000500)={'ip6gre0\x00', 0x0, 0x29, 0x78, 0xff, 0x7, 0x10, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x20, 0x40, 0x3, 0x1000}}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5000008, 0x10, r0, 0x0) 08:30:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cifs\x00', 0x4, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x54) readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) readv(r1, &(0x7f00000003c0), 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r3 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000180)=""/77, 0x4d}, {&(0x7f0000000200)=""/53, 0x35}], 0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) unlinkat(r3, &(0x7f0000000040)='./file0\x00', 0x0) unlinkat(r2, &(0x7f00000004c0)='./file0\x00', 0x200) r4 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x80002010}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x101, 0xc}}, './file0/file0\x00'}) [ 3360.741766] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88804720c000 (size 144): comm "syz-executor.3", pid 15593, jiffies 4298017001 (age 17.899s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 20 4a 45 68 00 00 00 00 ........ JEh.... 06 0b 9e 09 00 00 00 00 20 4a 45 68 00 00 00 00 ........ JEh.... backtrace: [<00000000e07cdb7b>] __kernfs_iattrs+0xbc/0x470 [<000000002eafcd9e>] kernfs_xattr_set+0x2b/0x80 [<00000000482c76ae>] selinux_kernfs_init_security+0x26d/0x4c0 [<000000008f64ed2e>] security_kernfs_init_security+0x4e/0xb0 [<000000001bf65462>] __kernfs_new_node+0x531/0x860 [<0000000019d7738e>] kernfs_new_node+0x18d/0x250 [<00000000e7f17a09>] kernfs_create_dir_ns+0x49/0x160 [<00000000437ff8ee>] cgroup_mkdir+0x315/0xf50 [<000000009fb89fb4>] kernfs_iop_mkdir+0x14d/0x1e0 [<00000000fb56ec34>] vfs_mkdir+0x493/0x750 [<00000000286d04f7>] do_mkdirat+0x150/0x2b0 [<000000003db70eb6>] do_syscall_64+0x33/0x40 [<0000000003de5216>] entry_SYSCALL_64_after_hwframe+0x67/0xd1 BUG: leak checking failed VM DIAGNOSIS: 08:30:42 Registers: info registers vcpu 0 RAX=ffffffff83e93390 RBX=0000000000000000 RCX=ffffffff83e7af2c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e93998 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85678908 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e9339e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f760bec6020 CR3=0000000016f08000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=2934343120657a697328203030306330 XMM03=3120646970202c22332e726f74756365 XMM04=2e2e2e2e2e2e2e202030302030302030 XMM05=20303020303020303020303020303020 XMM06=65747962203233207473726966282070 XMM07=37312065676128203130303731303839 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=dffffc0000000000 RBX=0000000000000001 RCX=ffffffff85d1204c RDX=1ffff11002ea2d92 RSI=0000000000000001 RDI=ffff888017516c90 RBP=ffff888017516c85 RSP=ffff888017516b78 R8 =ffffffff85d12051 R9 =ffffffff85d12052 R10=0000000000032042 R11=1ffff11002ea2d77 R12=ffff888017516c98 R13=ffff888017516c50 R14=1ffff11002ea2d77 R15=ffffffff85d12050 RIP=ffffffff81108cf1 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffe08b16f28 CR3=0000000018182000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000bfe62e42fefa39ef XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000