fffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:10:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 683.880806] FAULT_INJECTION: forcing a failure. [ 683.880806] name failslab, interval 1, probability 0, space 0, times 0 [ 683.882614] CPU: 0 PID: 5953 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 683.883617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 683.884850] Call Trace: [ 683.885252] dump_stack+0x107/0x167 [ 683.885820] should_fail.cold+0x5/0xa [ 683.886390] ? create_object.isra.0+0x3a/0xa20 [ 683.887089] should_failslab+0x5/0x20 [ 683.887658] kmem_cache_alloc+0x5b/0x310 [ 683.888279] ? stack_trace_consume_entry+0x160/0x160 [ 683.889039] create_object.isra.0+0x3a/0xa20 [ 683.889695] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 683.890455] kmem_cache_alloc+0x159/0x310 [ 683.891082] ? mempool_free_pages+0x20/0x20 [ 683.891733] mempool_alloc+0x148/0x360 [ 683.892334] ? mempool_resize+0x7d0/0x7d0 [ 683.892957] ? lock_chain_count+0x20/0x20 [ 683.893582] ? mark_held_locks+0x9e/0xe0 [ 683.894190] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 683.894976] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 683.895782] ? trace_hardirqs_on+0x5b/0x180 [ 683.896434] bio_alloc_bioset+0x36e/0x600 [ 683.897056] ? mark_held_locks+0x9e/0xe0 [ 683.897674] ? bvec_alloc+0x2f0/0x2f0 [ 683.898239] ? quarantine_put+0x8b/0x1a0 [ 683.898834] ? trace_hardirqs_on+0x5b/0x180 [ 683.899480] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 683.900210] jbd2_write_superblock+0x371/0x8a0 [ 683.900885] ? jbd2_journal_abort+0x140/0x140 [ 683.901553] ? kmem_cache_free+0x249/0x2d0 [ 683.902192] jbd2_journal_update_sb_log_tail+0x193/0x2c0 [ 683.902990] __jbd2_update_log_tail+0x55/0x390 [ 683.903659] ? bio_put+0x58/0x80 [ 683.904171] jbd2_cleanup_journal_tail+0x12d/0x1f0 [ 683.904893] ? __flush_batch+0x2e0/0x2e0 [ 683.905490] ? __brelse+0x84/0xa0 [ 683.906019] ? do_raw_spin_unlock+0x4f/0x220 [ 683.906670] jbd2_log_do_checkpoint+0x4c1/0xa00 [ 683.907362] ? do_raw_spin_lock+0x121/0x260 [ 683.907995] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 683.908823] ? rwlock_bug.part.0+0x90/0x90 [ 683.909467] jbd2_journal_flush+0x14b/0x530 [ 683.910123] __ext4_ioctl+0x2cd9/0x4190 [ 683.910719] ? ext4_reset_inode_seed+0x450/0x450 [ 683.911417] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 683.912186] ? find_held_lock+0x2c/0x110 [ 683.912795] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 683.913641] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 683.914402] ? do_vfs_ioctl+0x283/0x10d0 [ 683.914991] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 683.915764] ? generic_block_fiemap+0x60/0x60 [ 683.916422] ? lock_downgrade+0x6d0/0x6d0 [ 683.917031] ? __mutex_unlock_slowpath+0xe1/0x600 [ 683.917750] ? wait_for_completion_io+0x270/0x270 [ 683.918466] ? selinux_file_ioctl+0xb6/0x270 [ 683.919113] ? __ext4_ioctl+0x4190/0x4190 [ 683.919726] __x64_sys_ioctl+0x19a/0x210 [ 683.920325] do_syscall_64+0x33/0x40 [ 683.920870] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 683.921619] RIP: 0033:0x7fd6e335db19 [ 683.922161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 683.924818] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 683.925940] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 683.926992] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 683.928039] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 683.929085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 683.930144] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:10:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 8) 22:10:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 8) [ 683.996679] FAULT_INJECTION: forcing a failure. [ 683.996679] name failslab, interval 1, probability 0, space 0, times 0 [ 683.997782] CPU: 1 PID: 5959 Comm: syz-executor.5 Not tainted 5.10.220 #1 [ 683.998287] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 683.998893] Call Trace: [ 683.999120] dump_stack+0x107/0x167 [ 683.999397] should_fail.cold+0x5/0xa [ 683.999687] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 684.000216] should_failslab+0x5/0x20 [ 684.000503] __kmalloc+0x72/0x390 [ 684.000792] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 684.001265] ? genl_rcv_msg+0x3f8/0x5a0 [ 684.001569] genl_family_rcv_msg_doit+0xda/0x330 [ 684.001952] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 684.002443] ? memset+0x20/0x50 [ 684.002709] ? genl_op_from_small+0x23/0x3d0 [ 684.003063] ? genl_get_cmd+0x3cf/0x480 [ 684.003364] genl_rcv_msg+0x33c/0x5a0 [ 684.003651] ? genl_get_cmd+0x480/0x480 [ 684.003976] ? netlbl_mgmt_listall_cb+0x360/0x360 [ 684.004338] ? lock_release+0x680/0x680 [ 684.004659] ? netlink_deliver_tap+0xf4/0xcc0 [ 684.004998] netlink_rcv_skb+0x14b/0x430 [ 684.005300] ? genl_get_cmd+0x480/0x480 [ 684.005627] ? netlink_ack+0xab0/0xab0 [ 684.005945] ? netlink_deliver_tap+0x1c4/0xcc0 [ 684.006287] ? is_vmalloc_addr+0x7b/0xb0 [ 684.006590] genl_rcv+0x24/0x40 [ 684.006857] netlink_unicast+0x549/0x7f0 [ 684.007185] ? netlink_attachskb+0x870/0x870 [ 684.007519] netlink_sendmsg+0x90f/0xdf0 [ 684.007822] ? netlink_unicast+0x7f0/0x7f0 [ 684.008167] ? netlink_unicast+0x7f0/0x7f0 [ 684.008484] __sock_sendmsg+0x154/0x190 [ 684.008809] ____sys_sendmsg+0x70d/0x870 [ 684.009114] ? sock_write_iter+0x3d0/0x3d0 [ 684.009461] ? do_recvmmsg+0x6d0/0x6d0 [ 684.009756] ? lock_downgrade+0x6d0/0x6d0 [ 684.010094] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 684.010490] ___sys_sendmsg+0xf3/0x170 [ 684.010780] ? sendmsg_copy_msghdr+0x160/0x160 [ 684.011151] ? __fget_files+0x2cf/0x520 [ 684.011455] ? lock_downgrade+0x6d0/0x6d0 [ 684.011793] ? find_held_lock+0x2c/0x110 [ 684.012106] ? __fget_files+0x2f8/0x520 [ 684.012430] ? __fget_light+0xea/0x290 [ 684.012726] __sys_sendmsg+0xe5/0x1b0 [ 684.013032] ? __sys_sendmsg_sock+0x40/0x40 [ 684.013358] ? rcu_read_lock_any_held+0x75/0xa0 [ 684.013746] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 684.014140] ? syscall_enter_from_user_mode+0x1d/0x50 [ 684.014559] ? trace_hardirqs_on+0x5b/0x180 [ 684.014882] do_syscall_64+0x33/0x40 [ 684.015184] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 684.015565] RIP: 0033:0x7fd1c3a22b19 [ 684.015864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 684.017208] RSP: 002b:00007fd1c0f98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 684.017824] RAX: ffffffffffffffda RBX: 00007fd1c3b35f60 RCX: 00007fd1c3a22b19 [ 684.018394] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 684.018962] RBP: 00007fd1c0f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 684.019530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.020099] R13: 00007fff7f7fc7ef R14: 00007fd1c0f98300 R15: 0000000000022000 [ 684.045829] FAULT_INJECTION: forcing a failure. [ 684.045829] name failslab, interval 1, probability 0, space 0, times 0 [ 684.046790] CPU: 1 PID: 5961 Comm: syz-executor.0 Not tainted 5.10.220 #1 [ 684.047337] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 684.047994] Call Trace: [ 684.048211] dump_stack+0x107/0x167 [ 684.048503] should_fail.cold+0x5/0xa [ 684.048812] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 684.049334] should_failslab+0x5/0x20 [ 684.049650] __kmalloc+0x72/0x390 [ 684.049939] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 684.050448] genl_family_rcv_msg_doit+0xda/0x330 [ 684.050828] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 684.051360] ? cap_capable+0x1cd/0x230 [ 684.051677] ? security_capable+0x95/0xc0 [ 684.052015] ? ns_capable+0xe2/0x110 [ 684.052315] genl_rcv_msg+0x33c/0x5a0 [ 684.052622] ? genl_get_cmd+0x480/0x480 [ 684.052947] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 684.053353] ? lock_release+0x680/0x680 [ 684.053684] ? netlink_deliver_tap+0xf4/0xcc0 [ 684.054056] netlink_rcv_skb+0x14b/0x430 [ 684.054383] ? genl_get_cmd+0x480/0x480 [ 684.054704] ? netlink_ack+0xab0/0xab0 [ 684.055021] ? netlink_deliver_tap+0x1c4/0xcc0 [ 684.055392] ? is_vmalloc_addr+0x7b/0xb0 [ 684.055718] genl_rcv+0x24/0x40 [ 684.055981] netlink_unicast+0x549/0x7f0 [ 684.056309] ? netlink_attachskb+0x870/0x870 [ 684.056667] netlink_sendmsg+0x90f/0xdf0 [ 684.056997] ? netlink_unicast+0x7f0/0x7f0 [ 684.057344] ? netlink_unicast+0x7f0/0x7f0 [ 684.057689] __sock_sendmsg+0x154/0x190 [ 684.058006] ____sys_sendmsg+0x70d/0x870 [ 684.058337] ? sock_write_iter+0x3d0/0x3d0 [ 684.058676] ? do_recvmmsg+0x6d0/0x6d0 [ 684.058993] ? lock_downgrade+0x6d0/0x6d0 [ 684.059326] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 684.059752] ___sys_sendmsg+0xf3/0x170 [ 684.060067] ? sendmsg_copy_msghdr+0x160/0x160 [ 684.060438] ? __fget_files+0x2cf/0x520 [ 684.060762] ? lock_downgrade+0x6d0/0x6d0 [ 684.061096] ? find_held_lock+0x2c/0x110 [ 684.061430] ? __fget_files+0x2f8/0x520 [ 684.061763] ? __fget_light+0xea/0x290 [ 684.062083] __sys_sendmsg+0xe5/0x1b0 [ 684.062390] ? __sys_sendmsg_sock+0x40/0x40 [ 684.062737] ? rcu_read_lock_any_held+0x75/0xa0 [ 684.063123] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 684.063541] ? syscall_enter_from_user_mode+0x1d/0x50 [ 684.063956] ? trace_hardirqs_on+0x5b/0x180 [ 684.064304] do_syscall_64+0x33/0x40 [ 684.064605] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 684.065014] RIP: 0033:0x7f658804bb19 [ 684.065313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 684.066781] RSP: 002b:00007f65855c1188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 684.067388] RAX: ffffffffffffffda RBX: 00007f658815ef60 RCX: 00007f658804bb19 [ 684.067959] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 684.068527] RBP: 00007f65855c11d0 R08: 0000000000000000 R09: 0000000000000000 [ 684.069094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.069664] R13: 00007fffddb8049f R14: 00007f65855c1300 R15: 0000000000022000 22:10:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 9) 22:10:56 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 701.113733] FAULT_INJECTION: forcing a failure. [ 701.113733] name failslab, interval 1, probability 0, space 0, times 0 [ 701.114792] CPU: 1 PID: 5970 Comm: syz-executor.5 Not tainted 5.10.220 #1 [ 701.115337] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.115998] Call Trace: [ 701.116217] dump_stack+0x107/0x167 [ 701.116517] should_fail.cold+0x5/0xa [ 701.116830] ? create_object.isra.0+0x3a/0xa20 [ 701.117205] should_failslab+0x5/0x20 [ 701.117520] kmem_cache_alloc+0x5b/0x310 [ 701.117861] ? lock_release+0x680/0x680 [ 701.118192] create_object.isra.0+0x3a/0xa20 [ 701.118548] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 701.118963] __kmalloc+0x16e/0x390 [ 701.119257] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 701.119775] ? genl_rcv_msg+0x3f8/0x5a0 [ 701.120100] genl_family_rcv_msg_doit+0xda/0x330 [ 701.120485] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 701.121018] ? memset+0x20/0x50 [ 701.121291] ? genl_op_from_small+0x23/0x3d0 [ 701.121657] ? genl_get_cmd+0x3cf/0x480 [ 701.121984] genl_rcv_msg+0x33c/0x5a0 [ 701.122300] ? genl_get_cmd+0x480/0x480 [ 701.122623] ? netlbl_mgmt_listall_cb+0x360/0x360 [ 701.123012] ? lock_release+0x680/0x680 [ 701.123331] ? netlink_deliver_tap+0xf4/0xcc0 [ 701.123700] netlink_rcv_skb+0x14b/0x430 [ 701.124028] ? genl_get_cmd+0x480/0x480 [ 701.124348] ? netlink_ack+0xab0/0xab0 [ 701.124666] ? netlink_deliver_tap+0x1c4/0xcc0 [ 701.125034] ? is_vmalloc_addr+0x7b/0xb0 22:10:56 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 9) 22:10:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 701.125370] genl_rcv+0x24/0x40 [ 701.125745] netlink_unicast+0x549/0x7f0 [ 701.126081] ? netlink_attachskb+0x870/0x870 [ 701.126439] netlink_sendmsg+0x90f/0xdf0 [ 701.126767] ? netlink_unicast+0x7f0/0x7f0 [ 701.127110] ? netlink_unicast+0x7f0/0x7f0 [ 701.127448] __sock_sendmsg+0x154/0x190 [ 701.127768] ____sys_sendmsg+0x70d/0x870 [ 701.128093] ? sock_write_iter+0x3d0/0x3d0 [ 701.128432] ? do_recvmmsg+0x6d0/0x6d0 [ 701.128745] ? lock_downgrade+0x6d0/0x6d0 [ 701.129077] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 701.129504] ___sys_sendmsg+0xf3/0x170 [ 701.129821] ? sendmsg_copy_msghdr+0x160/0x160 [ 701.130188] ? __fget_files+0x2cf/0x520 [ 701.130508] ? lock_downgrade+0x6d0/0x6d0 [ 701.130840] ? find_held_lock+0x2c/0x110 [ 701.131173] ? __fget_files+0x2f8/0x520 [ 701.131497] ? __fget_light+0xea/0x290 [ 701.131811] __sys_sendmsg+0xe5/0x1b0 [ 701.132116] ? __sys_sendmsg_sock+0x40/0x40 [ 701.132463] ? rcu_read_lock_any_held+0x75/0xa0 [ 701.132842] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 701.133262] ? syscall_enter_from_user_mode+0x1d/0x50 [ 701.133678] ? trace_hardirqs_on+0x5b/0x180 [ 701.134025] do_syscall_64+0x33/0x40 [ 701.134324] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.134733] RIP: 0033:0x7fd1c3a22b19 [ 701.135031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.136480] RSP: 002b:00007fd1c0f98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 22:10:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) getdents(0xffffffffffffffff, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 701.137083] RAX: ffffffffffffffda RBX: 00007fd1c3b35f60 RCX: 00007fd1c3a22b19 [ 701.137774] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 701.138336] RBP: 00007fd1c0f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.138899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 701.139468] R13: 00007fff7f7fc7ef R14: 00007fd1c0f98300 R15: 0000000000022000 22:10:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 11) 22:10:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:10:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 701.167851] FAULT_INJECTION: forcing a failure. [ 701.167851] name failslab, interval 1, probability 0, space 0, times 0 [ 701.170307] CPU: 1 PID: 5981 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 701.170857] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.171536] Call Trace: [ 701.171757] dump_stack+0x107/0x167 [ 701.172054] should_fail.cold+0x5/0xa [ 701.172372] ? mempool_alloc+0x148/0x360 [ 701.172698] ? mempool_free_pages+0x20/0x20 [ 701.173048] should_failslab+0x5/0x20 [ 701.173359] kmem_cache_alloc+0x5b/0x310 [ 701.173396] FAULT_INJECTION: forcing a failure. [ 701.173396] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 701.173693] ? mempool_free_pages+0x20/0x20 [ 701.173745] mempool_alloc+0x148/0x360 [ 701.173758] ? mempool_resize+0x7d0/0x7d0 [ 701.176567] ? lock_acquire+0x197/0x470 [ 701.176888] ? find_held_lock+0x2c/0x110 [ 701.177224] bio_alloc_bioset+0x36e/0x600 [ 701.177562] ? submit_bio_noacct+0x1010/0x1010 [ 701.177933] ? bvec_alloc+0x2f0/0x2f0 [ 701.178251] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 701.178654] write_dirty_buffer+0xcb/0x180 [ 701.179000] __flush_batch+0x116/0x2e0 [ 701.179316] ? jbd2_journal_skip_recovery+0x160/0x160 [ 701.179727] ? lock_downgrade+0x6d0/0x6d0 [ 701.180072] ? jbd2_log_do_checkpoint+0x565/0xa00 [ 701.180469] jbd2_log_do_checkpoint+0x765/0xa00 [ 701.180849] ? do_raw_spin_lock+0x121/0x260 [ 701.181200] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 701.181657] ? rwlock_bug.part.0+0x90/0x90 [ 701.182004] jbd2_journal_flush+0x14b/0x530 [ 701.182359] __ext4_ioctl+0x2cd9/0x4190 [ 701.182690] ? ext4_reset_inode_seed+0x450/0x450 [ 701.183071] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 701.183496] ? find_held_lock+0x2c/0x110 [ 701.183832] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 701.184299] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 701.184711] ? do_vfs_ioctl+0x283/0x10d0 [ 701.185044] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 701.185462] ? generic_block_fiemap+0x60/0x60 [ 701.185831] ? lock_downgrade+0x6d0/0x6d0 [ 701.186165] ? __mutex_unlock_slowpath+0xe1/0x600 [ 701.186559] ? wait_for_completion_io+0x270/0x270 [ 701.186951] ? selinux_file_ioctl+0xb6/0x270 [ 701.187314] ? __ext4_ioctl+0x4190/0x4190 [ 701.187649] __x64_sys_ioctl+0x19a/0x210 [ 701.187982] do_syscall_64+0x33/0x40 [ 701.188282] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.188696] RIP: 0033:0x7fd6e335db19 [ 701.188995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.190491] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 701.191097] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 701.191673] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 701.192249] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.192826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 701.193401] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 [ 701.194010] CPU: 0 PID: 5982 Comm: syz-executor.0 Not tainted 5.10.220 #1 [ 701.195034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.196260] Call Trace: [ 701.196663] dump_stack+0x107/0x167 [ 701.197201] should_fail.cold+0x5/0xa [ 701.197790] _copy_from_user+0x2e/0x1b0 [ 701.198389] kstrtouint_from_user+0xbd/0x220 [ 701.199044] ? kstrtou8_from_user+0x210/0x210 [ 701.199719] ? lock_acquire+0x197/0x470 [ 701.200310] ? ksys_write+0x12d/0x260 [ 701.200884] proc_fail_nth_write+0x78/0x220 [ 701.201531] ? proc_task_getattr+0x1f0/0x1f0 [ 701.202211] ? proc_task_getattr+0x1f0/0x1f0 [ 701.202852] vfs_write+0x29a/0xb10 [ 701.203391] ksys_write+0x12d/0x260 [ 701.203922] ? __ia32_sys_read+0xb0/0xb0 [ 701.204523] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 701.205281] ? syscall_enter_from_user_mode+0x1d/0x50 [ 701.206046] do_syscall_64+0x33/0x40 [ 701.206589] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.207333] RIP: 0033:0x7f6587ffe5ff [ 701.207874] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 701.210567] RSP: 002b:00007f65855a0170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 701.211687] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6587ffe5ff [ 701.212737] RDX: 0000000000000001 RSI: 00007f65855a01e0 RDI: 0000000000000003 [ 701.213793] RBP: 00007f65855a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.214838] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 701.215896] R13: 00007fffddb8049f R14: 00007f65855a0300 R15: 0000000000022000 22:10:56 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:10:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 12) 22:10:56 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:10:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 10) [ 701.352650] FAULT_INJECTION: forcing a failure. [ 701.352650] name failslab, interval 1, probability 0, space 0, times 0 [ 701.354374] CPU: 0 PID: 5988 Comm: syz-executor.5 Not tainted 5.10.220 #1 [ 701.355392] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.356607] Call Trace: [ 701.357010] dump_stack+0x107/0x167 [ 701.357548] should_fail.cold+0x5/0xa [ 701.358126] ? __alloc_skb+0x6d/0x5b0 [ 701.358701] should_failslab+0x5/0x20 [ 701.359261] kmem_cache_alloc_node+0x55/0x330 [ 701.359931] __alloc_skb+0x6d/0x5b0 [ 701.360479] netlbl_mgmt_listdef+0xba/0x5f0 [ 701.361129] genl_family_rcv_msg_doit+0x22d/0x330 [ 701.361850] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 701.362842] ? genl_op_from_small+0x23/0x3d0 [ 701.363494] ? genl_get_cmd+0x3cf/0x480 [ 701.364091] genl_rcv_msg+0x33c/0x5a0 [ 701.364663] ? genl_get_cmd+0x480/0x480 [ 701.365261] ? netlbl_mgmt_listall_cb+0x360/0x360 [ 701.365999] ? lock_release+0x680/0x680 [ 701.366587] ? netlink_deliver_tap+0xf4/0xcc0 [ 701.367261] netlink_rcv_skb+0x14b/0x430 [ 701.367859] ? genl_get_cmd+0x480/0x480 [ 701.368456] ? netlink_ack+0xab0/0xab0 [ 701.369041] ? netlink_deliver_tap+0x1c4/0xcc0 [ 701.369713] ? is_vmalloc_addr+0x7b/0xb0 [ 701.370318] genl_rcv+0x24/0x40 [ 701.370801] netlink_unicast+0x549/0x7f0 [ 701.371400] ? netlink_attachskb+0x870/0x870 [ 701.372056] netlink_sendmsg+0x90f/0xdf0 [ 701.372654] ? netlink_unicast+0x7f0/0x7f0 [ 701.373289] ? netlink_unicast+0x7f0/0x7f0 [ 701.373926] __sock_sendmsg+0x154/0x190 [ 701.374512] ____sys_sendmsg+0x70d/0x870 [ 701.375109] ? sock_write_iter+0x3d0/0x3d0 [ 701.375729] ? do_recvmmsg+0x6d0/0x6d0 [ 701.376306] ? lock_downgrade+0x6d0/0x6d0 [ 701.376912] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 701.377678] ___sys_sendmsg+0xf3/0x170 [ 701.378245] ? sendmsg_copy_msghdr+0x160/0x160 [ 701.378923] ? __fget_files+0x2cf/0x520 [ 701.379502] ? lock_downgrade+0x6d0/0x6d0 [ 701.380118] ? find_held_lock+0x2c/0x110 [ 701.380744] ? __fget_files+0x2f8/0x520 [ 701.381352] ? __fget_light+0xea/0x290 [ 701.381934] __sys_sendmsg+0xe5/0x1b0 [ 701.382501] ? __sys_sendmsg_sock+0x40/0x40 [ 701.383128] ? rcu_read_lock_any_held+0x75/0xa0 [ 701.383827] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 701.384587] ? syscall_enter_from_user_mode+0x1d/0x50 [ 701.385350] ? trace_hardirqs_on+0x5b/0x180 [ 701.386000] do_syscall_64+0x33/0x40 [ 701.386549] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.387306] RIP: 0033:0x7fd1c3a22b19 [ 701.387866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.390559] RSP: 002b:00007fd1c0f98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 701.391667] RAX: ffffffffffffffda RBX: 00007fd1c3b35f60 RCX: 00007fd1c3a22b19 [ 701.392695] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 701.393726] RBP: 00007fd1c0f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.394751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 701.395799] R13: 00007fff7f7fc7ef R14: 00007fd1c0f98300 R15: 0000000000022000 22:10:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:10:56 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:10:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 701.452468] FAULT_INJECTION: forcing a failure. [ 701.452468] name failslab, interval 1, probability 0, space 0, times 0 [ 701.454464] CPU: 0 PID: 5991 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 701.455514] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.456714] Call Trace: [ 701.457121] dump_stack+0x107/0x167 [ 701.457684] should_fail.cold+0x5/0xa [ 701.458273] ? create_object.isra.0+0x3a/0xa20 [ 701.458970] should_failslab+0x5/0x20 [ 701.459552] kmem_cache_alloc+0x5b/0x310 [ 701.460180] create_object.isra.0+0x3a/0xa20 [ 701.460847] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 701.461623] kmem_cache_alloc+0x159/0x310 [ 701.462269] ? mempool_free_pages+0x20/0x20 [ 701.462926] mempool_alloc+0x148/0x360 [ 701.463520] ? _raw_spin_unlock_irq+0x27/0x30 [ 701.464203] ? mempool_resize+0x7d0/0x7d0 [ 701.464836] ? lock_acquire+0x197/0x470 [ 701.465438] ? find_held_lock+0x2c/0x110 [ 701.466085] bio_alloc_bioset+0x36e/0x600 [ 701.466714] ? submit_bio_noacct+0x1010/0x1010 [ 701.467407] ? bvec_alloc+0x2f0/0x2f0 [ 701.467998] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 701.468744] write_dirty_buffer+0xcb/0x180 [ 701.469386] __flush_batch+0x116/0x2e0 [ 701.469988] ? jbd2_journal_skip_recovery+0x160/0x160 [ 701.470772] ? __wait_on_bit+0x1b0/0x1b0 [ 701.471398] ? var_wake_function+0x130/0x130 [ 701.472078] jbd2_log_do_checkpoint+0x765/0xa00 [ 701.472793] ? do_raw_spin_lock+0x121/0x260 [ 701.473447] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 701.474311] ? rwlock_bug.part.0+0x90/0x90 [ 701.474971] jbd2_journal_flush+0x14b/0x530 [ 701.475635] __ext4_ioctl+0x2cd9/0x4190 [ 701.476258] ? ext4_reset_inode_seed+0x450/0x450 [ 701.476981] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 701.477786] ? find_held_lock+0x2c/0x110 [ 701.478418] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 701.479291] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 701.480074] ? do_vfs_ioctl+0x283/0x10d0 [ 701.480684] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 701.481446] ? generic_block_fiemap+0x60/0x60 [ 701.482139] ? lock_downgrade+0x6d0/0x6d0 [ 701.482767] ? __mutex_unlock_slowpath+0xe1/0x600 [ 701.483495] ? wait_for_completion_io+0x270/0x270 [ 701.484205] ? selinux_file_ioctl+0xb6/0x270 [ 701.484876] ? __ext4_ioctl+0x4190/0x4190 [ 701.485507] __x64_sys_ioctl+0x19a/0x210 [ 701.486134] do_syscall_64+0x33/0x40 [ 701.486695] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.487473] RIP: 0033:0x7fd6e335db19 [ 701.488044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.490825] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 701.491987] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 701.493068] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 701.494163] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.495241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 701.496324] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:10:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:10:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 11) 22:10:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:10:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:10:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 13) [ 701.699051] FAULT_INJECTION: forcing a failure. [ 701.699051] name failslab, interval 1, probability 0, space 0, times 0 [ 701.700033] CPU: 1 PID: 6004 Comm: syz-executor.5 Not tainted 5.10.220 #1 [ 701.700576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.701246] Call Trace: [ 701.701464] dump_stack+0x107/0x167 [ 701.701766] should_fail.cold+0x5/0xa [ 701.702074] ? create_object.isra.0+0x3a/0xa20 [ 701.702445] should_failslab+0x5/0x20 [ 701.702752] kmem_cache_alloc+0x5b/0x310 [ 701.703086] create_object.isra.0+0x3a/0xa20 [ 701.703442] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 701.703855] kmem_cache_alloc_node+0x169/0x330 [ 701.704230] __alloc_skb+0x6d/0x5b0 [ 701.704530] netlbl_mgmt_listdef+0xba/0x5f0 [ 701.704883] genl_family_rcv_msg_doit+0x22d/0x330 [ 701.705275] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 701.705818] ? genl_op_from_small+0x23/0x3d0 [ 701.706177] ? genl_get_cmd+0x3cf/0x480 [ 701.706512] genl_rcv_msg+0x33c/0x5a0 [ 701.706824] ? genl_get_cmd+0x480/0x480 [ 701.707145] ? netlbl_mgmt_listall_cb+0x360/0x360 [ 701.707540] ? lock_release+0x680/0x680 [ 701.707861] ? netlink_deliver_tap+0xf4/0xcc0 [ 701.708225] netlink_rcv_skb+0x14b/0x430 [ 701.708553] ? genl_get_cmd+0x480/0x480 [ 701.708877] ? netlink_ack+0xab0/0xab0 [ 701.709200] ? netlink_deliver_tap+0x1c4/0xcc0 [ 701.709567] ? is_vmalloc_addr+0x7b/0xb0 [ 701.709904] genl_rcv+0x24/0x40 [ 701.710172] netlink_unicast+0x549/0x7f0 [ 701.710505] ? netlink_attachskb+0x870/0x870 [ 701.710867] netlink_sendmsg+0x90f/0xdf0 [ 701.711206] ? netlink_unicast+0x7f0/0x7f0 [ 701.711553] ? netlink_unicast+0x7f0/0x7f0 [ 701.711898] __sock_sendmsg+0x154/0x190 [ 701.712223] ____sys_sendmsg+0x70d/0x870 [ 701.712549] ? sock_write_iter+0x3d0/0x3d0 [ 701.712891] ? do_recvmmsg+0x6d0/0x6d0 [ 701.713212] ? lock_downgrade+0x6d0/0x6d0 [ 701.713541] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 701.713974] ___sys_sendmsg+0xf3/0x170 [ 701.714295] ? sendmsg_copy_msghdr+0x160/0x160 [ 701.714668] ? __fget_files+0x2cf/0x520 [ 701.714989] ? lock_downgrade+0x6d0/0x6d0 [ 701.715330] ? find_held_lock+0x2c/0x110 [ 701.715666] ? __fget_files+0x2f8/0x520 [ 701.715992] ? __fget_light+0xea/0x290 [ 701.716316] __sys_sendmsg+0xe5/0x1b0 [ 701.716624] ? __sys_sendmsg_sock+0x40/0x40 [ 701.716972] ? rcu_read_lock_any_held+0x75/0xa0 [ 701.717363] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 701.717796] ? syscall_enter_from_user_mode+0x1d/0x50 [ 701.718212] ? trace_hardirqs_on+0x5b/0x180 [ 701.718562] do_syscall_64+0x33/0x40 [ 701.718867] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.719285] RIP: 0033:0x7fd1c3a22b19 [ 701.719591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.721065] RSP: 002b:00007fd1c0f98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 701.721689] RAX: ffffffffffffffda RBX: 00007fd1c3b35f60 RCX: 00007fd1c3a22b19 [ 701.722263] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 701.722836] RBP: 00007fd1c0f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.723408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 701.723978] R13: 00007fff7f7fc7ef R14: 00007fd1c0f98300 R15: 0000000000022000 [ 701.750011] perf: interrupt took too long (9813 > 9812), lowering kernel.perf_event_max_sample_rate to 20000 22:10:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x2, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:10:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r0, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:10:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 701.803198] FAULT_INJECTION: forcing a failure. [ 701.803198] name failslab, interval 1, probability 0, space 0, times 0 [ 701.804175] CPU: 1 PID: 6008 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 701.804706] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.805374] Call Trace: [ 701.805594] dump_stack+0x107/0x167 [ 701.805902] should_fail.cold+0x5/0xa [ 701.806214] ? create_object.isra.0+0x3a/0xa20 [ 701.806585] should_failslab+0x5/0x20 [ 701.806899] kmem_cache_alloc+0x5b/0x310 [ 701.807232] create_object.isra.0+0x3a/0xa20 [ 701.807597] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 701.808014] kmem_cache_alloc+0x159/0x310 [ 701.808352] ? mempool_free_pages+0x20/0x20 [ 701.808701] mempool_alloc+0x148/0x360 [ 701.809018] ? mempool_resize+0x7d0/0x7d0 [ 701.809369] bio_alloc_bioset+0x36e/0x600 [ 701.809711] ? submit_bio_noacct+0x1010/0x1010 [ 701.810077] ? bvec_alloc+0x2f0/0x2f0 [ 701.810393] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 701.810801] write_dirty_buffer+0xcb/0x180 [ 701.811145] __flush_batch+0x116/0x2e0 [ 701.811459] ? jbd2_journal_skip_recovery+0x160/0x160 [ 701.811875] ? lock_downgrade+0x6d0/0x6d0 [ 701.812224] jbd2_log_do_checkpoint+0x765/0xa00 [ 701.812607] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 701.813072] ? do_raw_spin_unlock+0x4f/0x220 [ 701.813431] jbd2_journal_flush+0x14b/0x530 [ 701.813805] __ext4_ioctl+0x2cd9/0x4190 [ 701.814135] ? ext4_reset_inode_seed+0x450/0x450 [ 701.814530] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 701.814952] ? find_held_lock+0x2c/0x110 [ 701.815295] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 701.815761] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 701.816178] ? do_vfs_ioctl+0x283/0x10d0 [ 701.816504] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 701.816927] ? generic_block_fiemap+0x60/0x60 [ 701.817288] ? lock_downgrade+0x6d0/0x6d0 [ 701.817626] ? __mutex_unlock_slowpath+0xe1/0x600 [ 701.818027] ? wait_for_completion_io+0x270/0x270 [ 701.818423] ? selinux_file_ioctl+0xb6/0x270 [ 701.818786] ? __ext4_ioctl+0x4190/0x4190 [ 701.819123] __x64_sys_ioctl+0x19a/0x210 [ 701.819458] do_syscall_64+0x33/0x40 [ 701.819759] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.820175] RIP: 0033:0x7fd6e335db19 [ 701.820483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.821960] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 701.822576] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 701.823157] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 701.823726] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.824307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 701.824879] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:11:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32, @ANYBLOB="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"]) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:11:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:11:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 714.386541] FAULT_INJECTION: forcing a failure. [ 714.386541] name failslab, interval 1, probability 0, space 0, times 0 [ 714.388230] CPU: 1 PID: 6038 Comm: syz-executor.5 Not tainted 5.10.220 #1 [ 714.389231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 714.390496] Call Trace: 22:11:09 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:11:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 12) 22:11:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 14) 22:11:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r0, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 714.390892] dump_stack+0x107/0x167 [ 714.391570] should_fail.cold+0x5/0xa [ 714.392199] should_failslab+0x5/0x20 [ 714.392760] __kmalloc_node_track_caller+0x74/0x3b0 [ 714.393491] ? netlbl_mgmt_listdef+0xba/0x5f0 [ 714.394162] __alloc_skb+0xb1/0x5b0 [ 714.394698] netlbl_mgmt_listdef+0xba/0x5f0 [ 714.395336] genl_family_rcv_msg_doit+0x22d/0x330 [ 714.396043] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 714.397010] ? genl_op_from_small+0x23/0x3d0 [ 714.397656] ? genl_get_cmd+0x3cf/0x480 [ 714.398249] genl_rcv_msg+0x33c/0x5a0 [ 714.398812] ? genl_get_cmd+0x480/0x480 [ 714.399394] ? netlbl_mgmt_listall_cb+0x360/0x360 [ 714.400113] ? lock_release+0x680/0x680 [ 714.400694] ? netlink_deliver_tap+0xf4/0xcc0 [ 714.401349] netlink_rcv_skb+0x14b/0x430 [ 714.401952] ? genl_get_cmd+0x480/0x480 [ 714.402534] ? netlink_ack+0xab0/0xab0 [ 714.403113] ? netlink_deliver_tap+0x1c4/0xcc0 [ 714.403781] ? is_vmalloc_addr+0x7b/0xb0 [ 714.404381] genl_rcv+0x24/0x40 [ 714.404865] netlink_unicast+0x549/0x7f0 [ 714.405465] ? netlink_attachskb+0x870/0x870 [ 714.406126] netlink_sendmsg+0x90f/0xdf0 [ 714.406720] ? netlink_unicast+0x7f0/0x7f0 [ 714.407356] ? netlink_unicast+0x7f0/0x7f0 [ 714.407974] __sock_sendmsg+0x154/0x190 [ 714.408557] ____sys_sendmsg+0x70d/0x870 [ 714.409155] ? sock_write_iter+0x3d0/0x3d0 [ 714.409773] ? do_recvmmsg+0x6d0/0x6d0 [ 714.410360] ? lock_downgrade+0x6d0/0x6d0 [ 714.410967] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 714.411732] ___sys_sendmsg+0xf3/0x170 [ 714.412306] ? sendmsg_copy_msghdr+0x160/0x160 [ 714.412975] ? __fget_files+0x2cf/0x520 [ 714.413559] ? lock_downgrade+0x6d0/0x6d0 [ 714.414170] ? find_held_lock+0x2c/0x110 [ 714.414771] ? __fget_files+0x2f8/0x520 [ 714.415356] ? __fget_light+0xea/0x290 [ 714.415934] __sys_sendmsg+0xe5/0x1b0 [ 714.416488] ? __sys_sendmsg_sock+0x40/0x40 [ 714.417119] ? rcu_read_lock_any_held+0x75/0xa0 [ 714.417819] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 714.418586] ? syscall_enter_from_user_mode+0x1d/0x50 [ 714.419340] ? trace_hardirqs_on+0x5b/0x180 [ 714.419970] do_syscall_64+0x33/0x40 [ 714.420517] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 714.421260] RIP: 0033:0x7fd1c3a22b19 [ 714.421806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.424461] RSP: 002b:00007fd1c0f98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 714.425567] RAX: ffffffffffffffda RBX: 00007fd1c3b35f60 RCX: 00007fd1c3a22b19 [ 714.426610] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 714.427643] RBP: 00007fd1c0f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.428670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 714.429703] R13: 00007fff7f7fc7ef R14: 00007fd1c0f98300 R15: 0000000000022000 22:11:09 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 714.468775] FAULT_INJECTION: forcing a failure. [ 714.468775] name failslab, interval 1, probability 0, space 0, times 0 [ 714.470590] CPU: 1 PID: 6039 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 714.471597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 714.472812] Call Trace: [ 714.473208] dump_stack+0x107/0x167 [ 714.473747] should_fail.cold+0x5/0xa [ 714.474325] ? lock_chain_count+0x20/0x20 [ 714.474935] ? create_object.isra.0+0x3a/0xa20 [ 714.475618] should_failslab+0x5/0x20 [ 714.476183] kmem_cache_alloc+0x5b/0x310 [ 714.476786] ? lock_chain_count+0x20/0x20 [ 714.477408] create_object.isra.0+0x3a/0xa20 [ 714.478072] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 714.478831] kmem_cache_alloc+0x159/0x310 [ 714.479452] ? mempool_free_pages+0x20/0x20 [ 714.480088] mempool_alloc+0x148/0x360 [ 714.480665] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 714.481433] ? mempool_resize+0x7d0/0x7d0 [ 714.482048] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 714.482861] bio_alloc_bioset+0x36e/0x600 [ 714.483467] ? __schedule+0x82c/0x1ea0 [ 714.484043] ? bvec_alloc+0x2f0/0x2f0 [ 714.484605] ? io_schedule_timeout+0x140/0x140 [ 714.485280] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 714.486014] write_dirty_buffer+0xcb/0x180 [ 714.486638] __flush_batch+0x116/0x2e0 [ 714.487213] ? jbd2_journal_skip_recovery+0x160/0x160 [ 714.487968] ? lock_downgrade+0x6d0/0x6d0 [ 714.488572] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 714.489385] jbd2_log_do_checkpoint+0x765/0xa00 [ 714.490083] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 714.490917] ? do_raw_spin_unlock+0x4f/0x220 [ 714.491575] jbd2_journal_flush+0x14b/0x530 [ 714.492221] __ext4_ioctl+0x2cd9/0x4190 [ 714.492823] ? ext4_reset_inode_seed+0x450/0x450 [ 714.493525] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 714.494300] ? find_held_lock+0x2c/0x110 [ 714.494912] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 714.495754] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 714.496515] ? do_vfs_ioctl+0x283/0x10d0 [ 714.497111] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 714.497880] ? generic_block_fiemap+0x60/0x60 [ 714.498542] ? lock_downgrade+0x6d0/0x6d0 [ 714.499158] ? __mutex_unlock_slowpath+0xe1/0x600 [ 714.499868] ? wait_for_completion_io+0x270/0x270 [ 714.500582] ? selinux_file_ioctl+0xb6/0x270 [ 714.501234] ? __ext4_ioctl+0x4190/0x4190 [ 714.501866] __x64_sys_ioctl+0x19a/0x210 [ 714.502464] do_syscall_64+0x33/0x40 [ 714.503007] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 714.503762] RIP: 0033:0x7fd6e335db19 [ 714.504312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.506983] RSP: 002b:00007fd6e08b2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 714.508097] RAX: ffffffffffffffda RBX: 00007fd6e3471020 RCX: 00007fd6e335db19 [ 714.509138] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 714.510184] RBP: 00007fd6e08b21d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.511218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 714.512254] R13: 00007ffe5a6697bf R14: 00007fd6e08b2300 R15: 0000000000022000 22:11:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 13) [ 714.656538] FAULT_INJECTION: forcing a failure. [ 714.656538] name failslab, interval 1, probability 0, space 0, times 0 [ 714.657545] CPU: 0 PID: 6045 Comm: syz-executor.5 Not tainted 5.10.220 #1 [ 714.658117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 714.658790] Call Trace: [ 714.659019] dump_stack+0x107/0x167 [ 714.659321] should_fail.cold+0x5/0xa [ 714.659640] ? create_object.isra.0+0x3a/0xa20 [ 714.660015] should_failslab+0x5/0x20 [ 714.660332] kmem_cache_alloc+0x5b/0x310 [ 714.660669] create_object.isra.0+0x3a/0xa20 [ 714.661032] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 714.661463] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 714.661881] ? netlbl_mgmt_listdef+0xba/0x5f0 [ 714.662259] __alloc_skb+0xb1/0x5b0 [ 714.662576] netlbl_mgmt_listdef+0xba/0x5f0 [ 714.662937] genl_family_rcv_msg_doit+0x22d/0x330 [ 714.663348] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 714.663902] ? genl_op_from_small+0x23/0x3d0 [ 714.664270] ? genl_get_cmd+0x3cf/0x480 [ 714.664601] genl_rcv_msg+0x33c/0x5a0 [ 714.664916] ? genl_get_cmd+0x480/0x480 [ 714.665245] ? netlbl_mgmt_listall_cb+0x360/0x360 [ 714.665644] ? lock_release+0x680/0x680 [ 714.665975] ? netlink_deliver_tap+0xf4/0xcc0 [ 714.666342] netlink_rcv_skb+0x14b/0x430 [ 714.666680] ? genl_get_cmd+0x480/0x480 [ 714.667005] ? netlink_ack+0xab0/0xab0 [ 714.667327] ? netlink_deliver_tap+0x1c4/0xcc0 [ 714.667700] ? is_vmalloc_addr+0x7b/0xb0 [ 714.668034] genl_rcv+0x24/0x40 [ 714.668304] netlink_unicast+0x549/0x7f0 [ 714.668636] ? netlink_attachskb+0x870/0x870 [ 714.669000] netlink_sendmsg+0x90f/0xdf0 [ 714.669348] ? netlink_unicast+0x7f0/0x7f0 [ 714.669700] ? netlink_unicast+0x7f0/0x7f0 [ 714.670052] __sock_sendmsg+0x154/0x190 [ 714.670391] ____sys_sendmsg+0x70d/0x870 [ 714.670728] ? sock_write_iter+0x3d0/0x3d0 [ 714.671069] ? do_recvmmsg+0x6d0/0x6d0 [ 714.671395] ? lock_downgrade+0x6d0/0x6d0 [ 714.671735] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 714.672169] ___sys_sendmsg+0xf3/0x170 [ 714.672493] ? sendmsg_copy_msghdr+0x160/0x160 [ 714.672869] ? __fget_files+0x2cf/0x520 [ 714.673200] ? lock_downgrade+0x6d0/0x6d0 [ 714.673536] ? find_held_lock+0x2c/0x110 [ 714.673879] ? __fget_files+0x2f8/0x520 [ 714.674209] ? __fget_light+0xea/0x290 [ 714.674532] __sys_sendmsg+0xe5/0x1b0 [ 714.674839] ? __sys_sendmsg_sock+0x40/0x40 [ 714.675192] ? rcu_read_lock_any_held+0x75/0xa0 [ 714.675587] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 714.676016] ? syscall_enter_from_user_mode+0x1d/0x50 [ 714.676446] ? trace_hardirqs_on+0x5b/0x180 [ 714.676803] do_syscall_64+0x33/0x40 [ 714.677110] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 714.677536] RIP: 0033:0x7fd1c3a22b19 [ 714.677850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.679327] RSP: 002b:00007fd1c0f98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 714.679948] RAX: ffffffffffffffda RBX: 00007fd1c3b35f60 RCX: 00007fd1c3a22b19 [ 714.680527] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 714.681104] RBP: 00007fd1c0f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.681677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 714.682262] R13: 00007fff7f7fc7ef R14: 00007fd1c0f98300 R15: 0000000000022000 22:11:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 15) 22:11:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32, @ANYBLOB="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"]) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:11:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:11:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 14) 22:11:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r0, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 726.653615] FAULT_INJECTION: forcing a failure. [ 726.653615] name failslab, interval 1, probability 0, space 0, times 0 [ 726.654713] CPU: 1 PID: 6061 Comm: syz-executor.5 Not tainted 5.10.220 #1 [ 726.655309] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 726.656039] Call Trace: [ 726.656280] dump_stack+0x107/0x167 [ 726.656603] should_fail.cold+0x5/0xa [ 726.656946] should_failslab+0x5/0x20 [ 726.657285] __kmalloc_node_track_caller+0x74/0x3b0 [ 726.657717] ? netlink_trim+0x1ee/0x250 [ 726.658083] pskb_expand_head+0x15a/0x1040 [ 726.658452] ? nla_put+0xfe/0x140 [ 726.658764] netlink_trim+0x1ee/0x250 [ 726.659096] netlink_unicast+0xb9/0x7f0 [ 726.659442] ? netlbl_mgmt_listdef+0x1dc/0x5f0 [ 726.659838] ? lock_downgrade+0x6d0/0x6d0 [ 726.660195] ? netlink_attachskb+0x870/0x870 [ 726.660589] ? netlbl_domhsh_search_def.part.0+0xb5/0x2d0 [ 726.661076] netlbl_mgmt_listdef+0x35c/0x5f0 [ 726.661473] genl_family_rcv_msg_doit+0x22d/0x330 [ 726.661897] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 726.662486] ? genl_op_from_small+0x23/0x3d0 [ 726.662876] ? genl_get_cmd+0x3cf/0x480 [ 726.663229] genl_rcv_msg+0x33c/0x5a0 [ 726.663571] ? genl_get_cmd+0x480/0x480 [ 726.663919] ? netlbl_mgmt_listall_cb+0x360/0x360 [ 726.664350] ? lock_release+0x680/0x680 [ 726.664703] ? netlink_deliver_tap+0xf4/0xcc0 [ 726.665087] netlink_rcv_skb+0x14b/0x430 [ 726.665443] ? genl_get_cmd+0x480/0x480 [ 726.665788] ? netlink_ack+0xab0/0xab0 [ 726.666142] ? netlink_deliver_tap+0x1c4/0xcc0 [ 726.666541] ? is_vmalloc_addr+0x7b/0xb0 [ 726.666890] genl_rcv+0x24/0x40 [ 726.667180] netlink_unicast+0x549/0x7f0 [ 726.667541] ? netlink_attachskb+0x870/0x870 [ 726.667926] netlink_sendmsg+0x90f/0xdf0 [ 726.668286] ? netlink_unicast+0x7f0/0x7f0 [ 726.668654] ? netlink_unicast+0x7f0/0x7f0 [ 726.669026] __sock_sendmsg+0x154/0x190 [ 726.669370] ____sys_sendmsg+0x70d/0x870 [ 726.669727] ? sock_write_iter+0x3d0/0x3d0 [ 726.670098] ? do_recvmmsg+0x6d0/0x6d0 [ 726.670445] ? lock_downgrade+0x6d0/0x6d0 [ 726.670809] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 726.671266] ___sys_sendmsg+0xf3/0x170 [ 726.671609] ? sendmsg_copy_msghdr+0x160/0x160 [ 726.672002] ? __fget_files+0x2cf/0x520 [ 726.672349] ? lock_downgrade+0x6d0/0x6d0 [ 726.672707] ? find_held_lock+0x2c/0x110 [ 726.673068] ? __fget_files+0x2f8/0x520 [ 726.673414] ? __fget_light+0xea/0x290 [ 726.673756] __sys_sendmsg+0xe5/0x1b0 [ 726.674092] ? __sys_sendmsg_sock+0x40/0x40 [ 726.674468] ? rcu_read_lock_any_held+0x75/0xa0 [ 726.674876] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 726.675333] ? syscall_enter_from_user_mode+0x1d/0x50 [ 726.675772] ? trace_hardirqs_on+0x5b/0x180 [ 726.676152] do_syscall_64+0x33/0x40 [ 726.676474] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 726.676918] RIP: 0033:0x7fd1c3a22b19 [ 726.677237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.678833] RSP: 002b:00007fd1c0f98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 726.679491] RAX: ffffffffffffffda RBX: 00007fd1c3b35f60 RCX: 00007fd1c3a22b19 [ 726.680110] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 726.680730] RBP: 00007fd1c0f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.681355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 726.681982] R13: 00007fff7f7fc7ef R14: 00007fd1c0f98300 R15: 0000000000022000 [ 726.732440] FAULT_INJECTION: forcing a failure. [ 726.732440] name failslab, interval 1, probability 0, space 0, times 0 [ 726.733487] CPU: 1 PID: 6067 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 726.734095] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 726.734802] Call Trace: [ 726.735033] dump_stack+0x107/0x167 [ 726.735356] should_fail.cold+0x5/0xa [ 726.735682] ? mempool_alloc+0x148/0x360 [ 726.736034] ? mempool_free_pages+0x20/0x20 [ 726.736413] should_failslab+0x5/0x20 [ 726.736738] kmem_cache_alloc+0x5b/0x310 [ 726.737098] ? mempool_free_pages+0x20/0x20 [ 726.737483] mempool_alloc+0x148/0x360 [ 726.737811] ? mempool_resize+0x7d0/0x7d0 [ 726.738200] ? submit_bio_noacct+0x6e7/0x1010 [ 726.738579] ? submit_bio+0xf6/0x4e0 [ 726.738893] bio_alloc_bioset+0x36e/0x600 [ 726.739249] ? submit_bio_noacct+0x1010/0x1010 [ 726.739644] ? bvec_alloc+0x2f0/0x2f0 [ 726.739984] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 726.740417] write_dirty_buffer+0xcb/0x180 [ 726.740781] __flush_batch+0x116/0x2e0 [ 726.741124] ? jbd2_journal_skip_recovery+0x160/0x160 [ 726.741579] ? lock_downgrade+0x6d0/0x6d0 [ 726.741941] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 726.742426] jbd2_log_do_checkpoint+0x765/0xa00 [ 726.742821] ? do_raw_spin_lock+0x121/0x260 [ 726.743189] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 726.743664] ? rwlock_bug.part.0+0x90/0x90 [ 726.744033] jbd2_journal_flush+0x14b/0x530 [ 726.744412] __ext4_ioctl+0x2cd9/0x4190 [ 726.744756] ? ext4_reset_inode_seed+0x450/0x450 [ 726.745165] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 726.745609] ? find_held_lock+0x2c/0x110 [ 726.745979] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 726.746471] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 726.746902] ? do_vfs_ioctl+0x283/0x10d0 [ 726.747257] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 726.747699] ? generic_block_fiemap+0x60/0x60 [ 726.748074] ? lock_downgrade+0x6d0/0x6d0 [ 726.748419] ? __mutex_unlock_slowpath+0xe1/0x600 [ 726.748826] ? wait_for_completion_io+0x270/0x270 [ 726.749246] ? selinux_file_ioctl+0xb6/0x270 [ 726.749617] ? __ext4_ioctl+0x4190/0x4190 [ 726.749973] __x64_sys_ioctl+0x19a/0x210 [ 726.750327] do_syscall_64+0x33/0x40 [ 726.750646] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 726.751076] RIP: 0033:0x7fd6e335db19 [ 726.751399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.752956] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 726.753606] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 726.754221] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 726.754828] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.755433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 726.756040] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:11:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x6, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:11:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 15) 22:11:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 16) [ 726.906573] FAULT_INJECTION: forcing a failure. [ 726.906573] name failslab, interval 1, probability 0, space 0, times 0 [ 726.907530] CPU: 1 PID: 6075 Comm: syz-executor.5 Not tainted 5.10.220 #1 [ 726.908078] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 726.908739] Call Trace: [ 726.908963] dump_stack+0x107/0x167 [ 726.909259] should_fail.cold+0x5/0xa [ 726.909572] ? ___slab_alloc+0x155/0x700 [ 726.909899] ? create_object.isra.0+0x3a/0xa20 [ 726.910280] should_failslab+0x5/0x20 [ 726.910588] kmem_cache_alloc+0x5b/0x310 [ 726.910918] create_object.isra.0+0x3a/0xa20 [ 726.911271] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 726.911685] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 726.912104] ? netlink_trim+0x1ee/0x250 [ 726.912447] pskb_expand_head+0x15a/0x1040 [ 726.912808] ? nla_put+0xfe/0x140 [ 726.913103] netlink_trim+0x1ee/0x250 [ 726.913419] netlink_unicast+0xb9/0x7f0 [ 726.913752] ? netlbl_mgmt_listdef+0x1dc/0x5f0 [ 726.914151] ? lock_downgrade+0x6d0/0x6d0 [ 726.914488] ? netlink_attachskb+0x870/0x870 [ 726.914848] ? netlbl_domhsh_search_def.part.0+0xb5/0x2d0 [ 726.915310] netlbl_mgmt_listdef+0x35c/0x5f0 [ 726.915674] genl_family_rcv_msg_doit+0x22d/0x330 [ 726.916073] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 726.916605] ? genl_op_from_small+0x23/0x3d0 [ 726.916929] ? genl_get_cmd+0x3cf/0x480 [ 726.917228] genl_rcv_msg+0x33c/0x5a0 [ 726.917511] ? genl_get_cmd+0x480/0x480 [ 726.917829] ? netlbl_mgmt_listall_cb+0x360/0x360 [ 726.918237] ? lock_release+0x680/0x680 [ 726.918566] ? netlink_deliver_tap+0xf4/0xcc0 [ 726.918930] netlink_rcv_skb+0x14b/0x430 [ 726.919243] ? genl_get_cmd+0x480/0x480 [ 726.919543] ? netlink_ack+0xab0/0xab0 [ 726.919863] ? netlink_deliver_tap+0x1c4/0xcc0 [ 726.920205] ? is_vmalloc_addr+0x7b/0xb0 [ 726.920534] genl_rcv+0x24/0x40 [ 726.920780] netlink_unicast+0x549/0x7f0 [ 726.921113] ? netlink_attachskb+0x870/0x870 [ 726.921445] netlink_sendmsg+0x90f/0xdf0 [ 726.921775] ? netlink_unicast+0x7f0/0x7f0 [ 726.922104] ? netlink_unicast+0x7f0/0x7f0 [ 726.922444] __sock_sendmsg+0x154/0x190 [ 726.922742] ____sys_sendmsg+0x70d/0x870 [ 726.923082] ? sock_write_iter+0x3d0/0x3d0 [ 726.923403] ? do_recvmmsg+0x6d0/0x6d0 [ 726.923725] ? lock_downgrade+0x6d0/0x6d0 [ 726.924064] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 726.924490] ___sys_sendmsg+0xf3/0x170 [ 726.924790] ? sendmsg_copy_msghdr+0x160/0x160 [ 726.925161] ? __fget_files+0x2cf/0x520 [ 726.925463] ? lock_downgrade+0x6d0/0x6d0 [ 726.925774] ? find_held_lock+0x2c/0x110 [ 726.926116] ? __fget_files+0x2f8/0x520 [ 726.926439] ? __fget_light+0xea/0x290 [ 726.926738] __sys_sendmsg+0xe5/0x1b0 [ 726.927041] ? __sys_sendmsg_sock+0x40/0x40 [ 726.927390] ? rcu_read_lock_any_held+0x75/0xa0 [ 726.927775] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 726.928166] ? syscall_enter_from_user_mode+0x1d/0x50 [ 726.928590] ? trace_hardirqs_on+0x5b/0x180 [ 726.928937] do_syscall_64+0x33/0x40 [ 726.929221] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 726.929633] RIP: 0033:0x7fd1c3a22b19 [ 726.929937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.931439] RSP: 002b:00007fd1c0f98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 726.932068] RAX: ffffffffffffffda RBX: 00007fd1c3b35f60 RCX: 00007fd1c3a22b19 [ 726.932657] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 726.933243] RBP: 00007fd1c0f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.933817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 726.934396] R13: 00007fff7f7fc7ef R14: 00007fd1c0f98300 R15: 0000000000022000 22:11:22 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:11:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x7, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:11:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32, @ANYBLOB="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"]) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 727.023403] FAULT_INJECTION: forcing a failure. [ 727.023403] name failslab, interval 1, probability 0, space 0, times 0 [ 727.025312] CPU: 0 PID: 6077 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 727.026305] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 727.027497] Call Trace: [ 727.027890] dump_stack+0x107/0x167 [ 727.028425] should_fail.cold+0x5/0xa [ 727.028979] ? create_object.isra.0+0x3a/0xa20 [ 727.029651] should_failslab+0x5/0x20 [ 727.030215] kmem_cache_alloc+0x5b/0x310 [ 727.030804] ? mempool_alloc+0x148/0x360 [ 727.031398] create_object.isra.0+0x3a/0xa20 [ 727.032033] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 727.032785] kmem_cache_alloc+0x159/0x310 [ 727.033390] ? mempool_free_pages+0x20/0x20 [ 727.034026] mempool_alloc+0x148/0x360 [ 727.034604] ? mempool_resize+0x7d0/0x7d0 [ 727.035213] ? mark_held_locks+0x9e/0xe0 [ 727.035815] bio_alloc_bioset+0x36e/0x600 [ 727.036416] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 727.037203] ? bvec_alloc+0x2f0/0x2f0 [ 727.037758] ? submit_bh_wbc.constprop.0+0x59a/0x780 [ 727.038519] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 727.039232] write_dirty_buffer+0xcb/0x180 [ 727.039847] __flush_batch+0x116/0x2e0 [ 727.040413] ? jbd2_journal_skip_recovery+0x160/0x160 [ 727.041163] ? __wait_on_bit+0x1b0/0x1b0 [ 727.041762] ? var_wake_function+0x130/0x130 [ 727.042437] jbd2_log_do_checkpoint+0x765/0xa00 [ 727.043123] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 727.043954] ? mutex_lock_io_nested+0x4f1/0xf30 [ 727.044652] jbd2_journal_flush+0x14b/0x530 [ 727.045293] __ext4_ioctl+0x2cd9/0x4190 [ 727.045896] ? ext4_reset_inode_seed+0x450/0x450 [ 727.046598] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 727.047367] ? find_held_lock+0x2c/0x110 [ 727.047977] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 727.048811] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 727.049556] ? do_vfs_ioctl+0x283/0x10d0 [ 727.050149] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 727.050909] ? generic_block_fiemap+0x60/0x60 [ 727.051560] ? lock_downgrade+0x6d0/0x6d0 [ 727.052173] ? __mutex_unlock_slowpath+0xe1/0x600 [ 727.052871] ? wait_for_completion_io+0x270/0x270 [ 727.053575] ? selinux_file_ioctl+0xb6/0x270 [ 727.054236] ? __ext4_ioctl+0x4190/0x4190 [ 727.054842] __x64_sys_ioctl+0x19a/0x210 [ 727.055442] do_syscall_64+0x33/0x40 [ 727.055978] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 727.056730] RIP: 0033:0x7fd6e335db19 [ 727.057276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.059929] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 727.061034] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 727.062067] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 727.063089] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 727.064119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 727.065148] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:11:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 16) 22:11:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 727.200755] FAULT_INJECTION: forcing a failure. [ 727.200755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 727.201981] CPU: 1 PID: 6089 Comm: syz-executor.5 Not tainted 5.10.220 #1 [ 727.202543] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 727.203220] Call Trace: [ 727.203445] dump_stack+0x107/0x167 [ 727.203745] should_fail.cold+0x5/0xa [ 727.204054] _copy_to_user+0x2e/0x180 [ 727.204375] simple_read_from_buffer+0xcc/0x160 [ 727.204768] proc_fail_nth_read+0x198/0x230 [ 727.205117] ? proc_sessionid_read+0x230/0x230 [ 727.205495] ? security_file_permission+0xb1/0xe0 [ 727.205888] ? proc_sessionid_read+0x230/0x230 [ 727.206266] vfs_read+0x228/0x620 [ 727.206546] ksys_read+0x12d/0x260 [ 727.206835] ? vfs_write+0xb10/0xb10 [ 727.207140] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 727.207568] ? syscall_enter_from_user_mode+0x1d/0x50 [ 727.207982] do_syscall_64+0x33/0x40 [ 727.208287] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 727.208697] RIP: 0033:0x7fd1c39d569c [ 727.208997] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 727.210500] RSP: 002b:00007fd1c0f98170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 727.211122] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 00007fd1c39d569c [ 727.211699] RDX: 000000000000000f RSI: 00007fd1c0f981e0 RDI: 0000000000000003 [ 727.212279] RBP: 00007fd1c0f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 727.212852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 727.213422] R13: 00007fff7f7fc7ef R14: 00007fd1c0f98300 R15: 0000000000022000 22:11:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x8, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:11:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 17) 22:11:34 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:11:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) getdents(0xffffffffffffffff, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:11:34 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x9, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:11:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:11:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 739.602747] FAULT_INJECTION: forcing a failure. [ 739.602747] name failslab, interval 1, probability 0, space 0, times 0 [ 739.604640] CPU: 1 PID: 6110 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 739.605631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 739.606825] Call Trace: [ 739.607217] dump_stack+0x107/0x167 [ 739.607746] should_fail.cold+0x5/0xa [ 739.608305] ? create_object.isra.0+0x3a/0xa20 [ 739.608964] should_failslab+0x5/0x20 [ 739.609515] kmem_cache_alloc+0x5b/0x310 22:11:34 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 739.610107] create_object.isra.0+0x3a/0xa20 [ 739.610823] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 739.611562] kmem_cache_alloc+0x159/0x310 [ 739.612166] ? mempool_free_pages+0x20/0x20 [ 739.612785] mempool_alloc+0x148/0x360 [ 739.613359] ? mempool_resize+0x7d0/0x7d0 [ 739.613962] ? lock_acquire+0x197/0x470 [ 739.614544] ? find_held_lock+0x2c/0x110 [ 739.615148] bio_alloc_bioset+0x36e/0x600 [ 739.615732] ? submit_bio_noacct+0x1010/0x1010 [ 739.616390] ? bvec_alloc+0x2f0/0x2f0 [ 739.616951] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 739.617662] write_dirty_buffer+0xcb/0x180 [ 739.618280] __flush_batch+0x116/0x2e0 [ 739.618842] ? jbd2_journal_skip_recovery+0x160/0x160 [ 739.619590] ? lock_downgrade+0x6d0/0x6d0 [ 739.620206] jbd2_log_do_checkpoint+0x765/0xa00 [ 739.620957] ? do_raw_spin_lock+0x121/0x260 [ 739.621588] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 739.622392] ? rwlock_bug.part.0+0x90/0x90 [ 739.623017] jbd2_journal_flush+0x14b/0x530 [ 739.623644] __ext4_ioctl+0x2cd9/0x4190 [ 739.624232] ? ext4_reset_inode_seed+0x450/0x450 [ 739.624921] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 739.625670] ? find_held_lock+0x2c/0x110 [ 739.626277] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 739.627104] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 739.627846] ? do_vfs_ioctl+0x283/0x10d0 [ 739.628428] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 739.629169] ? generic_block_fiemap+0x60/0x60 [ 739.629808] ? lock_downgrade+0x6d0/0x6d0 [ 739.630420] ? __mutex_unlock_slowpath+0xe1/0x600 [ 739.631115] ? wait_for_completion_io+0x270/0x270 [ 739.631812] ? selinux_file_ioctl+0xb6/0x270 [ 739.632451] ? __ext4_ioctl+0x4190/0x4190 [ 739.633054] __x64_sys_ioctl+0x19a/0x210 [ 739.633637] do_syscall_64+0x33/0x40 [ 739.634179] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 739.634908] RIP: 0033:0x7fd6e335db19 [ 739.635427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 739.638046] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 739.639136] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 739.640150] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 739.641159] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 739.642184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 739.643201] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:11:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 18) [ 739.852990] FAULT_INJECTION: forcing a failure. [ 739.852990] name failslab, interval 1, probability 0, space 0, times 0 [ 739.854994] CPU: 1 PID: 6126 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 739.855988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 739.857190] Call Trace: [ 739.857580] dump_stack+0x107/0x167 [ 739.858113] should_fail.cold+0x5/0xa [ 739.858683] ? mempool_alloc+0x148/0x360 [ 739.859275] ? mempool_free_pages+0x20/0x20 [ 739.859900] should_failslab+0x5/0x20 [ 739.860449] kmem_cache_alloc+0x5b/0x310 [ 739.861043] ? mempool_free_pages+0x20/0x20 [ 739.861666] mempool_alloc+0x148/0x360 [ 739.862228] ? mempool_resize+0x7d0/0x7d0 [ 739.862832] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 739.863583] ? _raw_spin_unlock_irq+0x1f/0x30 [ 739.864227] ? trace_hardirqs_on+0x5b/0x180 [ 739.864847] ? _raw_spin_unlock_irq+0x1f/0x30 [ 739.865491] ? finish_task_switch+0x126/0x5d0 [ 739.866143] ? finish_task_switch+0xef/0x5d0 [ 739.866779] ? __switch_to+0x572/0xf70 [ 739.867351] bio_alloc_bioset+0x36e/0x600 [ 739.867946] ? __schedule+0x82c/0x1ea0 [ 739.868497] ? bvec_alloc+0x2f0/0x2f0 [ 739.869050] ? io_schedule_timeout+0x140/0x140 [ 739.869718] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 739.870439] write_dirty_buffer+0xcb/0x180 [ 739.871053] __flush_batch+0x116/0x2e0 [ 739.871625] ? jbd2_journal_skip_recovery+0x160/0x160 [ 739.872369] ? lock_downgrade+0x6d0/0x6d0 [ 739.872988] jbd2_log_do_checkpoint+0x765/0xa00 [ 739.873668] ? do_raw_spin_lock+0x121/0x260 [ 739.874302] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 739.875098] ? rwlock_bug.part.0+0x90/0x90 [ 739.875721] jbd2_journal_flush+0x14b/0x530 [ 739.876356] __ext4_ioctl+0x2cd9/0x4190 [ 739.876949] ? ext4_reset_inode_seed+0x450/0x450 [ 739.877633] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 739.878401] ? find_held_lock+0x2c/0x110 [ 739.879004] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 739.879829] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 739.880577] ? do_vfs_ioctl+0x283/0x10d0 [ 739.881163] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 739.881893] ? generic_block_fiemap+0x60/0x60 [ 739.882549] ? lock_downgrade+0x6d0/0x6d0 [ 739.883148] ? __mutex_unlock_slowpath+0xe1/0x600 [ 739.883850] ? wait_for_completion_io+0x270/0x270 [ 739.884555] ? selinux_file_ioctl+0xb6/0x270 [ 739.885200] ? __ext4_ioctl+0x4190/0x4190 [ 739.885802] __x64_sys_ioctl+0x19a/0x210 [ 739.886402] do_syscall_64+0x33/0x40 [ 739.886941] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 739.887660] RIP: 0033:0x7fd6e335db19 [ 739.888200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 739.890762] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 739.891865] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 739.892862] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 739.893847] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 739.894848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 739.895831] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:11:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:11:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) getdents(0xffffffffffffffff, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:11:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:11:47 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:11:47 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:11:47 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 19) 22:11:47 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 752.490348] FAULT_INJECTION: forcing a failure. [ 752.490348] name failslab, interval 1, probability 0, space 0, times 0 [ 752.492285] CPU: 0 PID: 6148 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 752.493289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 752.494529] Call Trace: [ 752.494927] dump_stack+0x107/0x167 [ 752.495464] should_fail.cold+0x5/0xa [ 752.496035] ? mempool_alloc+0x148/0x360 [ 752.496632] ? mempool_free_pages+0x20/0x20 [ 752.497281] should_failslab+0x5/0x20 [ 752.497843] kmem_cache_alloc+0x5b/0x310 [ 752.498464] ? mempool_free_pages+0x20/0x20 [ 752.499101] mempool_alloc+0x148/0x360 [ 752.499687] ? mempool_resize+0x7d0/0x7d0 [ 752.500300] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 752.501104] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 752.501885] ? __lock_acquire+0x1657/0x5b00 [ 752.502546] bio_alloc_bioset+0x36e/0x600 [ 752.503173] ? bvec_alloc+0x2f0/0x2f0 [ 752.503738] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 752.504509] ? jbd2_journal_get_log_tail+0x186/0x4e0 [ 752.505267] ? lock_downgrade+0x6d0/0x6d0 [ 752.505892] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 752.506627] write_dirty_buffer+0xcb/0x180 [ 752.507261] __flush_batch+0x116/0x2e0 [ 752.507840] ? jbd2_journal_skip_recovery+0x160/0x160 [ 752.508615] ? lock_downgrade+0x6d0/0x6d0 [ 752.509256] jbd2_log_do_checkpoint+0x765/0xa00 [ 752.509954] ? do_raw_spin_lock+0x121/0x260 [ 752.510606] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 752.511451] ? rwlock_bug.part.0+0x90/0x90 [ 752.512085] jbd2_journal_flush+0x14b/0x530 [ 752.512746] __ext4_ioctl+0x2cd9/0x4190 [ 752.513352] ? ext4_reset_inode_seed+0x450/0x450 [ 752.514066] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 752.514854] ? find_held_lock+0x2c/0x110 [ 752.515472] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 752.516320] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 752.517091] ? do_vfs_ioctl+0x283/0x10d0 [ 752.517697] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 752.518490] ? generic_block_fiemap+0x60/0x60 [ 752.519148] ? lock_downgrade+0x6d0/0x6d0 [ 752.519765] ? __mutex_unlock_slowpath+0xe1/0x600 [ 752.520492] ? wait_for_completion_io+0x270/0x270 [ 752.521220] ? selinux_file_ioctl+0xb6/0x270 [ 752.521876] ? __ext4_ioctl+0x4190/0x4190 [ 752.522510] __x64_sys_ioctl+0x19a/0x210 [ 752.523115] do_syscall_64+0x33/0x40 [ 752.523672] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 752.524422] RIP: 0033:0x7fd6e335db19 [ 752.524977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 752.527708] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 752.528841] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 752.529890] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 752.530958] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 752.532014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 752.533073] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:11:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x2, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:11:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 20) 22:11:48 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:48 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x300, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:11:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 752.703406] FAULT_INJECTION: forcing a failure. [ 752.703406] name failslab, interval 1, probability 0, space 0, times 0 [ 752.704595] CPU: 1 PID: 6159 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 752.705151] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 752.705830] Call Trace: [ 752.706054] dump_stack+0x107/0x167 [ 752.706356] should_fail.cold+0x5/0xa [ 752.706677] ? create_object.isra.0+0x3a/0xa20 [ 752.707047] should_failslab+0x5/0x20 [ 752.707362] kmem_cache_alloc+0x5b/0x310 [ 752.707693] ? mark_lock+0xf5/0x2df0 [ 752.707999] create_object.isra.0+0x3a/0xa20 [ 752.708366] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 752.708854] kmem_cache_alloc+0x159/0x310 [ 752.709242] ? mempool_free_pages+0x20/0x20 [ 752.709632] mempool_alloc+0x148/0x360 [ 752.709960] ? mempool_resize+0x7d0/0x7d0 [ 752.710315] ? mark_held_locks+0x9e/0xe0 [ 752.710658] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 752.711089] bio_alloc_bioset+0x36e/0x600 [ 752.711439] ? bvec_alloc+0x2f0/0x2f0 [ 752.711770] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 752.712170] write_dirty_buffer+0xcb/0x180 [ 752.712529] __flush_batch+0x116/0x2e0 [ 752.712852] ? jbd2_journal_skip_recovery+0x160/0x160 [ 752.713277] ? lock_downgrade+0x6d0/0x6d0 [ 752.713632] ? jbd2_journal_put_journal_head+0x38a/0x560 [ 752.714069] jbd2_log_do_checkpoint+0x765/0xa00 [ 752.714481] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 752.714944] ? do_raw_spin_unlock+0x4f/0x220 [ 752.715305] jbd2_journal_flush+0x14b/0x530 [ 752.715673] __ext4_ioctl+0x2cd9/0x4190 [ 752.716009] ? ext4_reset_inode_seed+0x450/0x450 [ 752.716414] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 752.716844] ? find_held_lock+0x2c/0x110 [ 752.717185] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 752.717660] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 752.718080] ? do_vfs_ioctl+0x283/0x10d0 [ 752.718431] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 752.718854] ? generic_block_fiemap+0x60/0x60 [ 752.719224] ? lock_downgrade+0x6d0/0x6d0 [ 752.719585] ? __mutex_unlock_slowpath+0xe1/0x600 [ 752.719978] ? wait_for_completion_io+0x270/0x270 [ 752.720387] ? selinux_file_ioctl+0xb6/0x270 [ 752.720745] ? __ext4_ioctl+0x4190/0x4190 [ 752.721084] __x64_sys_ioctl+0x19a/0x210 [ 752.721409] do_syscall_64+0x33/0x40 [ 752.721711] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 752.722125] RIP: 0033:0x7fd6e335db19 [ 752.722431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 752.723905] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 752.724547] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 752.725121] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 752.725693] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 752.726261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 752.726837] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:11:48 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:11:48 executing program 6: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:11:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 21) [ 752.803397] FAULT_INJECTION: forcing a failure. [ 752.803397] name failslab, interval 1, probability 0, space 0, times 0 [ 752.804572] CPU: 1 PID: 6168 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 752.805118] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 752.805782] Call Trace: [ 752.806002] dump_stack+0x107/0x167 [ 752.806303] should_fail.cold+0x5/0xa [ 752.806616] ? mempool_alloc+0x148/0x360 [ 752.806942] ? mempool_free_pages+0x20/0x20 [ 752.807300] should_failslab+0x5/0x20 [ 752.807609] kmem_cache_alloc+0x5b/0x310 [ 752.807943] ? mempool_free_pages+0x20/0x20 [ 752.808292] mempool_alloc+0x148/0x360 [ 752.808610] ? mempool_resize+0x7d0/0x7d0 [ 752.808946] ? lock_acquire+0x197/0x470 [ 752.809269] ? find_held_lock+0x2c/0x110 [ 752.809606] bio_alloc_bioset+0x36e/0x600 [ 752.809939] ? submit_bio_noacct+0x1010/0x1010 [ 752.810320] ? bvec_alloc+0x2f0/0x2f0 [ 752.810636] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 752.811033] write_dirty_buffer+0xcb/0x180 [ 752.811382] __flush_batch+0x116/0x2e0 [ 752.811704] ? jbd2_journal_skip_recovery+0x160/0x160 [ 752.812120] ? lock_downgrade+0x6d0/0x6d0 [ 752.812471] jbd2_log_do_checkpoint+0x765/0xa00 [ 752.812856] ? do_raw_spin_lock+0x121/0x260 [ 752.813212] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 752.813674] ? rwlock_bug.part.0+0x90/0x90 [ 752.814021] jbd2_journal_flush+0x14b/0x530 [ 752.814390] __ext4_ioctl+0x2cd9/0x4190 [ 752.814719] ? ext4_reset_inode_seed+0x450/0x450 [ 752.815106] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 752.815532] ? find_held_lock+0x2c/0x110 [ 752.815869] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 752.816338] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 752.816752] ? do_vfs_ioctl+0x283/0x10d0 [ 752.817082] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 752.817503] ? generic_block_fiemap+0x60/0x60 [ 752.817863] ? lock_downgrade+0x6d0/0x6d0 [ 752.818200] ? __mutex_unlock_slowpath+0xe1/0x600 [ 752.818597] ? wait_for_completion_io+0x270/0x270 [ 752.818992] ? selinux_file_ioctl+0xb6/0x270 [ 752.819352] ? __ext4_ioctl+0x4190/0x4190 [ 752.819692] __x64_sys_ioctl+0x19a/0x210 [ 752.820019] do_syscall_64+0x33/0x40 [ 752.820321] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 752.820733] RIP: 0033:0x7fd6e335db19 [ 752.821032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 752.822507] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 752.823134] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 752.823719] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 752.824287] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 752.824859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 752.825441] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:12:01 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:01 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x500, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:12:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) getdents(0xffffffffffffffff, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 22) 22:12:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x8, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:12:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) getdents(0xffffffffffffffff, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:01 executing program 6: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 766.630970] FAULT_INJECTION: forcing a failure. [ 766.630970] name failslab, interval 1, probability 0, space 0, times 0 [ 766.632891] CPU: 0 PID: 6189 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 766.633884] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 766.635082] Call Trace: [ 766.635470] dump_stack+0x107/0x167 [ 766.636002] should_fail.cold+0x5/0xa [ 766.636557] ? create_object.isra.0+0x3a/0xa20 [ 766.637230] should_failslab+0x5/0x20 [ 766.637778] kmem_cache_alloc+0x5b/0x310 [ 766.638372] create_object.isra.0+0x3a/0xa20 [ 766.639023] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 766.639762] kmem_cache_alloc+0x159/0x310 [ 766.640368] ? mempool_free_pages+0x20/0x20 [ 766.640995] mempool_alloc+0x148/0x360 [ 766.641565] ? mempool_resize+0x7d0/0x7d0 [ 766.642167] ? lock_acquire+0x197/0x470 [ 766.642747] ? find_held_lock+0x2c/0x110 [ 766.643350] bio_alloc_bioset+0x36e/0x600 [ 766.643947] ? submit_bio_noacct+0x1010/0x1010 [ 766.644608] ? bvec_alloc+0x2f0/0x2f0 [ 766.645172] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 766.645883] write_dirty_buffer+0xcb/0x180 [ 766.646504] __flush_batch+0x116/0x2e0 [ 766.647082] ? jbd2_journal_skip_recovery+0x160/0x160 [ 766.647822] ? lock_downgrade+0x6d0/0x6d0 [ 766.648440] jbd2_log_do_checkpoint+0x765/0xa00 [ 766.649119] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 766.649935] ? mutex_lock_io_nested+0x4f1/0xf30 [ 766.650620] jbd2_journal_flush+0x14b/0x530 [ 766.651253] __ext4_ioctl+0x2cd9/0x4190 [ 766.651845] ? ext4_reset_inode_seed+0x450/0x450 [ 766.652531] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 766.653295] ? find_held_lock+0x2c/0x110 [ 766.653896] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 766.654735] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 766.655474] ? do_vfs_ioctl+0x283/0x10d0 [ 766.656054] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 766.656802] ? generic_block_fiemap+0x60/0x60 [ 766.657458] ? lock_downgrade+0x6d0/0x6d0 [ 766.658055] ? __mutex_unlock_slowpath+0xe1/0x600 [ 766.658762] ? wait_for_completion_io+0x270/0x270 [ 766.659465] ? selinux_file_ioctl+0xb6/0x270 [ 766.660106] ? __ext4_ioctl+0x4190/0x4190 [ 766.660705] __x64_sys_ioctl+0x19a/0x210 [ 766.661291] do_syscall_64+0x33/0x40 [ 766.661825] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 766.662573] RIP: 0033:0x7fd6e335db19 [ 766.663112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 766.665726] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 766.666829] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 766.667841] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 766.668852] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 766.669873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 766.670899] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:12:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x600, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:12:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 23) [ 766.924061] FAULT_INJECTION: forcing a failure. [ 766.924061] name failslab, interval 1, probability 0, space 0, times 0 [ 766.925889] CPU: 1 PID: 6199 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 766.926857] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 766.928019] Call Trace: [ 766.928407] dump_stack+0x107/0x167 [ 766.928925] should_fail.cold+0x5/0xa [ 766.929474] ? mempool_alloc+0x148/0x360 [ 766.930045] ? mempool_free_pages+0x20/0x20 [ 766.930662] should_failslab+0x5/0x20 [ 766.931199] kmem_cache_alloc+0x5b/0x310 [ 766.931776] ? mempool_free_pages+0x20/0x20 [ 766.932414] mempool_alloc+0x148/0x360 [ 766.932962] ? mempool_resize+0x7d0/0x7d0 [ 766.933564] ? mark_held_locks+0x9e/0xe0 [ 766.934154] bio_alloc_bioset+0x36e/0x600 [ 766.934750] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 766.935509] ? bvec_alloc+0x2f0/0x2f0 [ 766.936044] ? submit_bh_wbc.constprop.0+0x5c3/0x780 [ 766.936769] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 766.937474] write_dirty_buffer+0xcb/0x180 [ 766.938080] __flush_batch+0x116/0x2e0 [ 766.938659] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 766.939422] ? jbd2_journal_skip_recovery+0x160/0x160 [ 766.940149] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 766.940921] ? jbd2_log_do_checkpoint+0x7a7/0xa00 [ 766.941611] jbd2_log_do_checkpoint+0x765/0xa00 [ 766.942276] ? do_raw_spin_lock+0x121/0x260 [ 766.942896] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 766.943694] ? rwlock_bug.part.0+0x90/0x90 [ 766.944302] jbd2_journal_flush+0x14b/0x530 [ 766.944943] __ext4_ioctl+0x2cd9/0x4190 [ 766.945514] ? ext4_reset_inode_seed+0x450/0x450 [ 766.946206] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 766.946950] ? find_held_lock+0x2c/0x110 [ 766.947564] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 766.948374] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 766.949131] ? do_vfs_ioctl+0x283/0x10d0 [ 766.949710] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 766.950485] ? generic_block_fiemap+0x60/0x60 [ 766.951126] ? lock_downgrade+0x6d0/0x6d0 [ 766.951749] ? __mutex_unlock_slowpath+0xe1/0x600 [ 766.952437] ? wait_for_completion_io+0x270/0x270 [ 766.953152] ? selinux_file_ioctl+0xb6/0x270 [ 766.953785] ? __ext4_ioctl+0x4190/0x4190 [ 766.954397] __x64_sys_ioctl+0x19a/0x210 [ 766.954992] do_syscall_64+0x33/0x40 [ 766.955538] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 766.956261] RIP: 0033:0x7fd6e335db19 [ 766.956808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 766.959391] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 766.960505] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 766.961503] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 766.962509] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 766.963500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 766.964500] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:12:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x700, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:12:02 executing program 6: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:02 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 24) 22:12:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x900, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:12:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 767.233397] FAULT_INJECTION: forcing a failure. [ 767.233397] name failslab, interval 1, probability 0, space 0, times 0 [ 767.235412] CPU: 1 PID: 6215 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 767.236396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 767.237812] Call Trace: [ 767.238289] dump_stack+0x107/0x167 [ 767.238934] should_fail.cold+0x5/0xa [ 767.239613] ? create_object.isra.0+0x3a/0xa20 [ 767.240416] should_failslab+0x5/0x20 [ 767.241086] kmem_cache_alloc+0x5b/0x310 [ 767.241810] create_object.isra.0+0x3a/0xa20 [ 767.242593] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 767.243491] kmem_cache_alloc+0x159/0x310 [ 767.244262] ? mempool_free_pages+0x20/0x20 [ 767.245017] mempool_alloc+0x148/0x360 [ 767.245734] ? mempool_resize+0x7d0/0x7d0 [ 767.246483] ? lock_acquire+0x197/0x470 [ 767.247194] ? find_held_lock+0x2c/0x110 [ 767.247931] bio_alloc_bioset+0x36e/0x600 [ 767.248691] ? submit_bio_noacct+0x1010/0x1010 [ 767.249511] ? bvec_alloc+0x2f0/0x2f0 [ 767.250237] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 767.251137] write_dirty_buffer+0xcb/0x180 [ 767.251906] __flush_batch+0x116/0x2e0 [ 767.252613] ? jbd2_journal_skip_recovery+0x160/0x160 [ 767.253554] ? lock_downgrade+0x6d0/0x6d0 [ 767.254325] jbd2_log_do_checkpoint+0x765/0xa00 [ 767.255186] ? do_raw_spin_lock+0x121/0x260 [ 767.255971] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 767.256993] ? rwlock_bug.part.0+0x90/0x90 [ 767.257782] jbd2_journal_flush+0x14b/0x530 [ 767.258603] __ext4_ioctl+0x2cd9/0x4190 [ 767.259344] ? ext4_reset_inode_seed+0x450/0x450 [ 767.260209] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 767.261173] ? find_held_lock+0x2c/0x110 [ 767.261936] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 767.263063] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 767.263973] ? do_vfs_ioctl+0x283/0x10d0 [ 767.264688] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 767.265606] ? generic_block_fiemap+0x60/0x60 [ 767.266391] ? lock_downgrade+0x6d0/0x6d0 [ 767.267105] ? __mutex_unlock_slowpath+0xe1/0x600 [ 767.267810] ? wait_for_completion_io+0x270/0x270 [ 767.268527] ? selinux_file_ioctl+0xb6/0x270 [ 767.269183] ? __ext4_ioctl+0x4190/0x4190 [ 767.269789] __x64_sys_ioctl+0x19a/0x210 [ 767.270393] do_syscall_64+0x33/0x40 [ 767.270952] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 767.271699] RIP: 0033:0x7fd6e335db19 [ 767.272241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 767.274900] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 767.276008] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 767.277038] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 767.278061] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 767.279098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 767.280139] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:12:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xa00, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 772.157098] Bluetooth: hci7: command 0x0409 tx timeout [ 774.204089] Bluetooth: hci7: command 0x041b tx timeout [ 776.252149] Bluetooth: hci7: command 0x040f tx timeout [ 776.853605] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 776.855154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 776.860639] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 776.877767] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 776.879220] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 776.881462] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 778.300572] Bluetooth: hci7: command 0x0419 tx timeout 22:12:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf00, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:12:26 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x9, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:12:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 25) 22:12:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:26 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 791.166291] FAULT_INJECTION: forcing a failure. [ 791.166291] name failslab, interval 1, probability 0, space 0, times 0 [ 791.167341] CPU: 0 PID: 6690 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 791.167908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.168637] Call Trace: [ 791.168869] dump_stack+0x107/0x167 [ 791.169190] should_fail.cold+0x5/0xa [ 791.169521] ? mempool_alloc+0x148/0x360 [ 791.169871] ? mempool_free_pages+0x20/0x20 [ 791.170263] should_failslab+0x5/0x20 [ 791.170590] kmem_cache_alloc+0x5b/0x310 [ 791.170958] ? mempool_free_pages+0x20/0x20 [ 791.171343] mempool_alloc+0x148/0x360 [ 791.171678] ? mempool_resize+0x7d0/0x7d0 [ 791.172054] ? lock_acquire+0x197/0x470 [ 791.172409] ? find_held_lock+0x2c/0x110 [ 791.172764] bio_alloc_bioset+0x36e/0x600 [ 791.173137] ? submit_bio_noacct+0x1010/0x1010 [ 791.173524] ? bvec_alloc+0x2f0/0x2f0 [ 791.173856] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 791.174292] write_dirty_buffer+0xcb/0x180 [ 791.174655] __flush_batch+0x116/0x2e0 [ 791.174992] ? jbd2_journal_skip_recovery+0x160/0x160 [ 791.175439] ? lock_downgrade+0x6d0/0x6d0 [ 791.175814] jbd2_log_do_checkpoint+0x765/0xa00 [ 791.176214] ? do_raw_spin_lock+0x121/0x260 [ 791.176592] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 791.177076] ? rwlock_bug.part.0+0x90/0x90 [ 791.177451] jbd2_journal_flush+0x14b/0x530 [ 791.177844] __ext4_ioctl+0x2cd9/0x4190 [ 791.178205] ? ext4_reset_inode_seed+0x450/0x450 [ 791.178611] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 791.179063] ? find_held_lock+0x2c/0x110 [ 791.179433] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 791.179921] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 791.180363] ? do_vfs_ioctl+0x283/0x10d0 [ 791.180708] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 791.181156] ? generic_block_fiemap+0x60/0x60 [ 791.181539] ? lock_downgrade+0x6d0/0x6d0 [ 791.181900] ? __mutex_unlock_slowpath+0xe1/0x600 [ 791.182326] ? wait_for_completion_io+0x270/0x270 [ 791.182752] ? selinux_file_ioctl+0xb6/0x270 [ 791.183150] ? __ext4_ioctl+0x4190/0x4190 [ 791.183510] __x64_sys_ioctl+0x19a/0x210 [ 791.183859] do_syscall_64+0x33/0x40 [ 791.184188] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 791.184621] RIP: 0033:0x7fd6e335db19 [ 791.184944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.186508] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 791.187157] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 791.187766] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 791.188376] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.188986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 791.189586] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:12:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:12:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xf, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:12:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:26 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r0, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 26) 22:12:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x30000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:12:26 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 791.435984] FAULT_INJECTION: forcing a failure. [ 791.435984] name failslab, interval 1, probability 0, space 0, times 0 [ 791.437245] CPU: 0 PID: 6715 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 791.437808] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.438490] Call Trace: [ 791.438721] dump_stack+0x107/0x167 [ 791.439029] should_fail.cold+0x5/0xa [ 791.439355] ? create_object.isra.0+0x3a/0xa20 [ 791.439742] should_failslab+0x5/0x20 [ 791.440053] kmem_cache_alloc+0x5b/0x310 [ 791.440398] create_object.isra.0+0x3a/0xa20 [ 791.440760] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 791.441192] kmem_cache_alloc+0x159/0x310 [ 791.441547] ? mempool_free_pages+0x20/0x20 [ 791.441904] mempool_alloc+0x148/0x360 [ 791.442238] ? mempool_resize+0x7d0/0x7d0 [ 791.442583] ? lock_acquire+0x197/0x470 [ 791.442918] ? find_held_lock+0x2c/0x110 [ 791.443271] bio_alloc_bioset+0x36e/0x600 [ 791.443618] ? submit_bio_noacct+0x1010/0x1010 [ 791.443989] ? bvec_alloc+0x2f0/0x2f0 [ 791.444317] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 791.444718] write_dirty_buffer+0xcb/0x180 [ 791.445071] __flush_batch+0x116/0x2e0 [ 791.445393] ? jbd2_journal_skip_recovery+0x160/0x160 [ 791.445810] ? lock_downgrade+0x6d0/0x6d0 [ 791.446148] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 791.446599] jbd2_log_do_checkpoint+0x765/0xa00 [ 791.446992] ? do_raw_spin_lock+0x121/0x260 [ 791.447345] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 791.447806] ? rwlock_bug.part.0+0x90/0x90 [ 791.448162] jbd2_journal_flush+0x14b/0x530 [ 791.448526] __ext4_ioctl+0x2cd9/0x4190 [ 791.448860] ? ext4_reset_inode_seed+0x450/0x450 [ 791.449257] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 791.449687] ? find_held_lock+0x2c/0x110 [ 791.450028] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 791.450517] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 791.450950] ? do_vfs_ioctl+0x283/0x10d0 [ 791.451291] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 791.451739] ? generic_block_fiemap+0x60/0x60 [ 791.452104] ? lock_downgrade+0x6d0/0x6d0 [ 791.452456] ? __mutex_unlock_slowpath+0xe1/0x600 [ 791.452869] ? wait_for_completion_io+0x270/0x270 [ 791.453282] ? selinux_file_ioctl+0xb6/0x270 [ 791.453640] ? __ext4_ioctl+0x4190/0x4190 [ 791.453994] __x64_sys_ioctl+0x19a/0x210 [ 791.454346] do_syscall_64+0x33/0x40 [ 791.454655] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 791.455082] RIP: 0033:0x7fd6e335db19 [ 791.455399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.456918] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 791.457538] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 791.458118] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 791.458694] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.459286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 791.459859] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:12:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x60, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:12:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x34000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:12:26 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r0, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 27) [ 791.653317] FAULT_INJECTION: forcing a failure. [ 791.653317] name failslab, interval 1, probability 0, space 0, times 0 [ 791.654306] CPU: 0 PID: 6730 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 791.654862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.655540] Call Trace: [ 791.655761] dump_stack+0x107/0x167 [ 791.656059] should_fail.cold+0x5/0xa [ 791.656375] ? mempool_alloc+0x148/0x360 [ 791.656715] ? mempool_free_pages+0x20/0x20 [ 791.657084] should_failslab+0x5/0x20 [ 791.657396] kmem_cache_alloc+0x5b/0x310 [ 791.657724] ? mempool_free_pages+0x20/0x20 [ 791.658088] mempool_alloc+0x148/0x360 [ 791.658412] ? mempool_resize+0x7d0/0x7d0 [ 791.658762] ? lock_acquire+0x197/0x470 [ 791.659089] ? find_held_lock+0x2c/0x110 [ 791.659429] bio_alloc_bioset+0x36e/0x600 [ 791.659764] ? submit_bio_noacct+0x1010/0x1010 [ 791.660139] ? bvec_alloc+0x2f0/0x2f0 [ 791.660463] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 791.660861] write_dirty_buffer+0xcb/0x180 [ 791.661217] __flush_batch+0x116/0x2e0 [ 791.661542] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 791.661993] ? jbd2_journal_skip_recovery+0x160/0x160 [ 791.662428] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 791.662887] jbd2_log_do_checkpoint+0x765/0xa00 [ 791.663271] ? do_raw_spin_lock+0x121/0x260 [ 791.663632] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 791.664105] ? rwlock_bug.part.0+0x90/0x90 [ 791.664463] jbd2_journal_flush+0x14b/0x530 [ 791.664822] __ext4_ioctl+0x2cd9/0x4190 [ 791.665163] ? ext4_reset_inode_seed+0x450/0x450 [ 791.665547] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 791.665977] ? find_held_lock+0x2c/0x110 [ 791.666329] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 791.666803] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 791.667234] ? do_vfs_ioctl+0x283/0x10d0 [ 791.667565] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 791.667985] ? generic_block_fiemap+0x60/0x60 [ 791.668359] ? lock_downgrade+0x6d0/0x6d0 [ 791.668699] ? __mutex_unlock_slowpath+0xe1/0x600 [ 791.669099] ? wait_for_completion_io+0x270/0x270 [ 791.669505] ? selinux_file_ioctl+0xb6/0x270 [ 791.669864] ? __ext4_ioctl+0x4190/0x4190 [ 791.670216] __x64_sys_ioctl+0x19a/0x210 [ 791.670564] do_syscall_64+0x33/0x40 [ 791.670874] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 791.671306] RIP: 0033:0x7fd6e335db19 [ 791.671617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.673145] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 791.673773] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 791.674374] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 791.674966] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.675554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 791.676137] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:12:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r0, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:27 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xf0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:12:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 28) 22:12:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r0, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x80000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:12:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x300, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:12:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x400300, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 804.110198] FAULT_INJECTION: forcing a failure. [ 804.110198] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 804.111951] CPU: 1 PID: 6758 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 804.112938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 804.114143] Call Trace: [ 804.114543] dump_stack+0x107/0x167 [ 804.115086] should_fail.cold+0x5/0xa [ 804.115645] __alloc_pages_nodemask+0x182/0x600 [ 804.116335] ? perf_event_idx_default+0x10/0x10 [ 804.117014] ? event_sched_in+0x5b1/0xaa0 [ 804.117641] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 804.118535] ? kmem_cache_alloc+0x301/0x310 [ 804.119185] alloc_pages_current+0x187/0x280 [ 804.119837] allocate_slab+0x26f/0x380 [ 804.120422] ___slab_alloc+0x470/0x700 [ 804.120983] ? mempool_alloc+0x148/0x360 [ 804.121588] ? mempool_alloc+0x148/0x360 [ 804.122196] ? kmem_cache_alloc+0x301/0x310 [ 804.122822] ? mempool_alloc+0x148/0x360 [ 804.123418] kmem_cache_alloc+0x301/0x310 [ 804.124039] ? mempool_free_pages+0x20/0x20 [ 804.124674] mempool_alloc+0x148/0x360 [ 804.125257] ? mempool_resize+0x7d0/0x7d0 [ 804.125865] ? _raw_spin_unlock_irq+0x1f/0x30 [ 804.126511] ? _raw_spin_unlock_irq+0x27/0x30 [ 804.127178] ? finish_task_switch+0x126/0x5d0 [ 804.127827] ? finish_task_switch+0xef/0x5d0 [ 804.128474] ? __switch_to+0x572/0xf70 [ 804.129043] bio_alloc_bioset+0x36e/0x600 [ 804.129651] ? __schedule+0x82c/0x1ea0 [ 804.130221] ? bvec_alloc+0x2f0/0x2f0 [ 804.130783] ? io_schedule_timeout+0x140/0x140 [ 804.131450] ? lock_downgrade+0x6d0/0x6d0 [ 804.132059] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 804.132782] write_dirty_buffer+0xcb/0x180 [ 804.133406] __flush_batch+0x116/0x2e0 [ 804.133977] ? jbd2_journal_skip_recovery+0x160/0x160 [ 804.134728] ? lock_downgrade+0x6d0/0x6d0 [ 804.135348] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 804.136156] jbd2_log_do_checkpoint+0x765/0xa00 [ 804.136844] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 804.137678] ? mutex_lock_io_nested+0x4f1/0xf30 [ 804.138362] jbd2_journal_flush+0x14b/0x530 [ 804.139010] __ext4_ioctl+0x2cd9/0x4190 [ 804.139607] ? ext4_reset_inode_seed+0x450/0x450 [ 804.140310] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 804.141075] ? find_held_lock+0x2c/0x110 [ 804.141693] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 804.142537] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 804.143299] ? do_vfs_ioctl+0x283/0x10d0 [ 804.143895] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 804.144656] ? generic_block_fiemap+0x60/0x60 [ 804.145308] ? lock_downgrade+0x6d0/0x6d0 [ 804.145909] ? __mutex_unlock_slowpath+0xe1/0x600 [ 804.146620] ? wait_for_completion_io+0x270/0x270 [ 804.147342] ? selinux_file_ioctl+0xb6/0x270 [ 804.147998] ? __ext4_ioctl+0x4190/0x4190 [ 804.148613] __x64_sys_ioctl+0x19a/0x210 [ 804.149194] do_syscall_64+0x33/0x40 [ 804.149739] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 804.150482] RIP: 0033:0x7fd6e335db19 [ 804.151041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 804.153699] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 804.154794] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 804.155829] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 804.156856] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 804.157869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 804.158884] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:12:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x900, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:12:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 29) 22:12:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf0ffff, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:12:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xf00, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:12:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x1000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 816.473263] FAULT_INJECTION: forcing a failure. [ 816.473263] name failslab, interval 1, probability 0, space 0, times 0 [ 816.474318] CPU: 0 PID: 6788 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 816.474920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 816.475641] Call Trace: [ 816.475879] dump_stack+0x107/0x167 [ 816.476210] should_fail.cold+0x5/0xa [ 816.476542] ? mempool_alloc+0x148/0x360 [ 816.476895] ? mempool_free_pages+0x20/0x20 [ 816.477281] should_failslab+0x5/0x20 [ 816.477605] kmem_cache_alloc+0x5b/0x310 [ 816.477949] ? mempool_free_pages+0x20/0x20 [ 816.478326] mempool_alloc+0x148/0x360 [ 816.478671] ? mempool_resize+0x7d0/0x7d0 [ 816.479039] ? lock_acquire+0x197/0x470 [ 816.479394] ? find_held_lock+0x2c/0x110 [ 816.479751] bio_alloc_bioset+0x36e/0x600 [ 816.480107] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 816.480572] ? bvec_alloc+0x2f0/0x2f0 [ 816.480897] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 816.481357] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 816.481777] write_dirty_buffer+0xcb/0x180 [ 816.482133] __flush_batch+0x116/0x2e0 [ 816.482463] ? jbd2_journal_skip_recovery+0x160/0x160 [ 816.482896] ? lock_downgrade+0x6d0/0x6d0 [ 816.483276] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 816.483737] jbd2_log_do_checkpoint+0x765/0xa00 [ 816.484132] ? do_raw_spin_lock+0x121/0x260 [ 816.484508] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 816.484974] ? rwlock_bug.part.0+0x90/0x90 [ 816.485339] jbd2_journal_flush+0x14b/0x530 [ 816.485711] __ext4_ioctl+0x2cd9/0x4190 [ 816.486051] ? ext4_reset_inode_seed+0x450/0x450 [ 816.486457] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 816.486898] ? find_held_lock+0x2c/0x110 [ 816.487256] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 816.487736] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 816.488172] ? do_vfs_ioctl+0x283/0x10d0 [ 816.488514] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 816.488964] ? generic_block_fiemap+0x60/0x60 [ 816.489354] ? lock_downgrade+0x6d0/0x6d0 [ 816.489707] ? __mutex_unlock_slowpath+0xe1/0x600 [ 816.490112] ? wait_for_completion_io+0x270/0x270 [ 816.490523] ? selinux_file_ioctl+0xb6/0x270 [ 816.490908] ? __ext4_ioctl+0x4190/0x4190 [ 816.491272] __x64_sys_ioctl+0x19a/0x210 [ 816.491615] do_syscall_64+0x33/0x40 [ 816.491939] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 816.492383] RIP: 0033:0x7fd6e335db19 [ 816.492695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.494232] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 816.494872] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 816.495487] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 816.496087] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 816.496704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 816.497306] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:12:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 30) 22:12:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:52 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x2000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:12:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x6000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:12:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 816.663325] FAULT_INJECTION: forcing a failure. [ 816.663325] name failslab, interval 1, probability 0, space 0, times 0 [ 816.664362] CPU: 0 PID: 6800 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 816.664909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 816.665611] Call Trace: [ 816.665834] dump_stack+0x107/0x167 [ 816.666136] should_fail.cold+0x5/0xa [ 816.666462] ? create_object.isra.0+0x3a/0xa20 [ 816.666829] should_failslab+0x5/0x20 [ 816.667150] kmem_cache_alloc+0x5b/0x310 [ 816.667480] ? lock_chain_count+0x20/0x20 [ 816.667817] create_object.isra.0+0x3a/0xa20 [ 816.668185] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 816.668602] kmem_cache_alloc+0x159/0x310 [ 816.668938] ? mempool_free_pages+0x20/0x20 [ 816.669304] mempool_alloc+0x148/0x360 [ 816.669615] ? mempool_resize+0x7d0/0x7d0 [ 816.669954] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 816.670385] ? _raw_spin_unlock_irq+0x1f/0x30 [ 816.670761] ? trace_hardirqs_on+0x5b/0x180 [ 816.671121] ? _raw_spin_unlock_irq+0x1f/0x30 [ 816.671495] ? finish_task_switch+0x126/0x5d0 [ 816.671868] ? finish_task_switch+0xef/0x5d0 [ 816.672240] ? __switch_to+0x572/0xf70 [ 816.672572] bio_alloc_bioset+0x36e/0x600 [ 816.672925] ? __schedule+0x82c/0x1ea0 [ 816.673255] ? bvec_alloc+0x2f0/0x2f0 [ 816.673570] ? io_schedule_timeout+0x140/0x140 [ 816.673963] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 816.674374] write_dirty_buffer+0xcb/0x180 [ 816.674722] __flush_batch+0x116/0x2e0 [ 816.675051] ? jbd2_journal_skip_recovery+0x160/0x160 [ 816.675489] ? lock_downgrade+0x6d0/0x6d0 [ 816.675840] jbd2_log_do_checkpoint+0x765/0xa00 [ 816.676240] ? do_raw_spin_lock+0x121/0x260 [ 816.676595] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 816.677062] ? rwlock_bug.part.0+0x90/0x90 [ 816.677435] jbd2_journal_flush+0x14b/0x530 [ 816.677802] __ext4_ioctl+0x2cd9/0x4190 [ 816.678138] ? ext4_reset_inode_seed+0x450/0x450 [ 816.678528] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 816.678964] ? find_held_lock+0x2c/0x110 [ 816.679334] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 816.679816] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 816.680253] ? do_vfs_ioctl+0x283/0x10d0 [ 816.680587] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 816.681027] ? generic_block_fiemap+0x60/0x60 [ 816.681408] ? lock_downgrade+0x6d0/0x6d0 [ 816.681760] ? __mutex_unlock_slowpath+0xe1/0x600 [ 816.682184] ? wait_for_completion_io+0x270/0x270 [ 816.682602] ? selinux_file_ioctl+0xb6/0x270 [ 816.682970] ? __ext4_ioctl+0x4190/0x4190 [ 816.683329] __x64_sys_ioctl+0x19a/0x210 [ 816.683660] do_syscall_64+0x33/0x40 [ 816.683968] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 816.684397] RIP: 0033:0x7fd6e335db19 [ 816.684702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.686221] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 816.686854] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 816.687450] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 816.688043] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 816.688645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 816.689248] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:12:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:12:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:12:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 31) 22:13:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x3000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xf000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 830.041948] FAULT_INJECTION: forcing a failure. [ 830.041948] name failslab, interval 1, probability 0, space 0, times 0 [ 830.043867] CPU: 1 PID: 6834 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 830.044869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 830.046085] Call Trace: [ 830.046480] dump_stack+0x107/0x167 [ 830.047015] should_fail.cold+0x5/0xa [ 830.047588] ? mempool_alloc+0x148/0x360 [ 830.048177] ? mempool_free_pages+0x20/0x20 [ 830.048808] should_failslab+0x5/0x20 [ 830.049369] kmem_cache_alloc+0x5b/0x310 [ 830.049968] ? mempool_free_pages+0x20/0x20 [ 830.050598] mempool_alloc+0x148/0x360 [ 830.051182] ? mempool_resize+0x7d0/0x7d0 [ 830.051822] ? lock_acquire+0x197/0x470 [ 830.052402] ? find_held_lock+0x2c/0x110 [ 830.053005] bio_alloc_bioset+0x36e/0x600 [ 830.053613] ? submit_bio_noacct+0x1010/0x1010 [ 830.054275] ? bvec_alloc+0x2f0/0x2f0 [ 830.054852] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 830.055582] write_dirty_buffer+0xcb/0x180 [ 830.056201] __flush_batch+0x116/0x2e0 [ 830.056775] ? jbd2_journal_skip_recovery+0x160/0x160 [ 830.057531] ? lock_downgrade+0x6d0/0x6d0 [ 830.058154] jbd2_log_do_checkpoint+0x765/0xa00 [ 830.058845] ? do_raw_spin_lock+0x121/0x260 [ 830.059491] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 830.060312] ? rwlock_bug.part.0+0x90/0x90 [ 830.060944] jbd2_journal_flush+0x14b/0x530 [ 830.061583] __ext4_ioctl+0x2cd9/0x4190 [ 830.062188] ? ext4_reset_inode_seed+0x450/0x450 [ 830.062885] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 830.063664] ? find_held_lock+0x2c/0x110 [ 830.064286] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 830.065147] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 830.065906] ? do_vfs_ioctl+0x283/0x10d0 [ 830.066514] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 830.067297] ? generic_block_fiemap+0x60/0x60 [ 830.067961] ? lock_downgrade+0x6d0/0x6d0 [ 830.068578] ? __mutex_unlock_slowpath+0xe1/0x600 [ 830.069307] ? wait_for_completion_io+0x270/0x270 [ 830.070032] ? selinux_file_ioctl+0xb6/0x270 [ 830.070696] ? __ext4_ioctl+0x4190/0x4190 [ 830.071316] __x64_sys_ioctl+0x19a/0x210 [ 830.071918] do_syscall_64+0x33/0x40 [ 830.072472] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 830.073223] RIP: 0033:0x7fd6e335db19 [ 830.073770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.076501] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 830.077796] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 830.078832] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 830.079894] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 830.080928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 830.081982] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:13:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x30000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x4000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 32) 22:13:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x5000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 830.353588] FAULT_INJECTION: forcing a failure. [ 830.353588] name failslab, interval 1, probability 0, space 0, times 0 [ 830.355622] CPU: 1 PID: 6850 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 830.356622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 830.357824] Call Trace: [ 830.358217] dump_stack+0x107/0x167 [ 830.358756] should_fail.cold+0x5/0xa [ 830.359332] ? create_object.isra.0+0x3a/0xa20 [ 830.360001] should_failslab+0x5/0x20 [ 830.360559] kmem_cache_alloc+0x5b/0x310 [ 830.361155] create_object.isra.0+0x3a/0xa20 [ 830.361803] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 830.362555] kmem_cache_alloc+0x159/0x310 [ 830.363173] ? mempool_free_pages+0x20/0x20 [ 830.363819] mempool_alloc+0x148/0x360 [ 830.364388] ? trace_hardirqs_on+0x5b/0x180 [ 830.365021] ? mempool_resize+0x7d0/0x7d0 [ 830.365635] ? lock_acquire+0x197/0x470 [ 830.366222] ? find_held_lock+0x2c/0x110 [ 830.366826] bio_alloc_bioset+0x36e/0x600 [ 830.367440] ? submit_bio_noacct+0x1010/0x1010 [ 830.368113] ? bvec_alloc+0x2f0/0x2f0 [ 830.368684] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 830.369405] write_dirty_buffer+0xcb/0x180 [ 830.370030] __flush_batch+0x116/0x2e0 [ 830.370600] ? jbd2_journal_skip_recovery+0x160/0x160 [ 830.371362] ? __brelse+0x51/0xa0 [ 830.371872] ? retbleed_untrain_ret+0x1/0x1 [ 830.372512] jbd2_log_do_checkpoint+0x765/0xa00 [ 830.373204] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 830.374024] ? mutex_lock_io_nested+0x4f1/0xf30 [ 830.374715] jbd2_journal_flush+0x14b/0x530 [ 830.375360] __ext4_ioctl+0x2cd9/0x4190 [ 830.375959] ? ext4_reset_inode_seed+0x450/0x450 [ 830.376651] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 830.377411] ? find_held_lock+0x2c/0x110 [ 830.378019] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 830.378856] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 830.379622] ? do_vfs_ioctl+0x283/0x10d0 [ 830.380212] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 830.380981] ? generic_block_fiemap+0x60/0x60 [ 830.381635] ? lock_downgrade+0x6d0/0x6d0 [ 830.382247] ? __mutex_unlock_slowpath+0xe1/0x600 [ 830.382952] ? wait_for_completion_io+0x270/0x270 [ 830.383674] ? selinux_file_ioctl+0xb6/0x270 [ 830.384324] ? __ext4_ioctl+0x4190/0x4190 [ 830.384931] __x64_sys_ioctl+0x19a/0x210 [ 830.385527] do_syscall_64+0x33/0x40 [ 830.386069] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 830.386817] RIP: 0033:0x7fd6e335db19 [ 830.387375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.390033] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 830.391134] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 830.392174] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 830.393209] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 830.394236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 830.395280] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:13:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x34000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:20 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x6000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 33) 22:13:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:20 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 845.007616] FAULT_INJECTION: forcing a failure. [ 845.007616] name failslab, interval 1, probability 0, space 0, times 0 22:13:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 845.008988] CPU: 0 PID: 6869 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 845.009737] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 845.010537] Call Trace: [ 845.010804] dump_stack+0x107/0x167 [ 845.011166] should_fail.cold+0x5/0xa [ 845.011553] ? create_object.isra.0+0x3a/0xa20 [ 845.012010] should_failslab+0x5/0x20 [ 845.012388] kmem_cache_alloc+0x5b/0x310 [ 845.012791] create_object.isra.0+0x3a/0xa20 [ 845.013225] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 845.013728] kmem_cache_alloc+0x159/0x310 [ 845.014147] ? mempool_free_pages+0x20/0x20 [ 845.014570] mempool_alloc+0x148/0x360 [ 845.014947] ? mempool_resize+0x7d0/0x7d0 [ 845.015348] ? lock_acquire+0x197/0x470 [ 845.015731] ? find_held_lock+0x2c/0x110 [ 845.016131] bio_alloc_bioset+0x36e/0x600 [ 845.016521] ? submit_bio_noacct+0x1010/0x1010 [ 845.016951] ? bvec_alloc+0x2f0/0x2f0 [ 845.017324] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 845.017795] write_dirty_buffer+0xcb/0x180 [ 845.018199] __flush_batch+0x116/0x2e0 [ 845.018572] ? jbd2_journal_skip_recovery+0x160/0x160 [ 845.019062] ? lock_downgrade+0x6d0/0x6d0 [ 845.019467] ? unlock_buffer+0x16/0x30 [ 845.019848] jbd2_log_do_checkpoint+0x765/0xa00 [ 845.020296] ? do_raw_spin_lock+0x121/0x260 [ 845.020706] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 845.021243] ? rwlock_bug.part.0+0x90/0x90 [ 845.021651] jbd2_journal_flush+0x14b/0x530 [ 845.022070] __ext4_ioctl+0x2cd9/0x4190 [ 845.022462] ? ext4_reset_inode_seed+0x450/0x450 [ 845.022911] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 845.023411] ? find_held_lock+0x2c/0x110 [ 845.023819] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 845.024363] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 845.024854] ? do_vfs_ioctl+0x283/0x10d0 [ 845.025240] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 845.025735] ? generic_block_fiemap+0x60/0x60 [ 845.026160] ? lock_downgrade+0x6d0/0x6d0 [ 845.026561] ? __mutex_unlock_slowpath+0xe1/0x600 [ 845.027020] ? wait_for_completion_io+0x270/0x270 [ 845.027491] ? selinux_file_ioctl+0xb6/0x270 [ 845.027912] ? __ext4_ioctl+0x4190/0x4190 [ 845.028310] __x64_sys_ioctl+0x19a/0x210 [ 845.028702] do_syscall_64+0x33/0x40 [ 845.029060] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 845.029542] RIP: 0033:0x7fd6e335db19 [ 845.029897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.031626] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 845.032341] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 845.033005] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 845.033675] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 845.034337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 845.035005] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:13:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x80000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 34) 22:13:20 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x7000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:20 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:20 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x9000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 845.241609] FAULT_INJECTION: forcing a failure. [ 845.241609] name failslab, interval 1, probability 0, space 0, times 0 [ 845.242881] CPU: 0 PID: 6886 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 845.243495] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 845.244224] Call Trace: [ 845.244464] dump_stack+0x107/0x167 [ 845.244786] should_fail.cold+0x5/0xa 22:13:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x400300, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 845.245130] ? create_object.isra.0+0x3a/0xa20 [ 845.245625] should_failslab+0x5/0x20 [ 845.245957] kmem_cache_alloc+0x5b/0x310 [ 845.246315] create_object.isra.0+0x3a/0xa20 [ 845.246696] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 845.247148] kmem_cache_alloc+0x159/0x310 [ 845.247516] ? mempool_free_pages+0x20/0x20 [ 845.247889] mempool_alloc+0x148/0x360 [ 845.248230] ? mempool_resize+0x7d0/0x7d0 [ 845.248591] ? lock_acquire+0x197/0x470 [ 845.248933] ? find_held_lock+0x2c/0x110 [ 845.249295] bio_alloc_bioset+0x36e/0x600 [ 845.249652] ? submit_bio_noacct+0x1010/0x1010 [ 845.250047] ? bvec_alloc+0x2f0/0x2f0 [ 845.250382] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 845.250809] write_dirty_buffer+0xcb/0x180 [ 845.251176] __flush_batch+0x116/0x2e0 [ 845.251520] ? jbd2_journal_skip_recovery+0x160/0x160 [ 845.251965] ? lock_downgrade+0x6d0/0x6d0 [ 845.252332] jbd2_log_do_checkpoint+0x765/0xa00 [ 845.252739] ? do_raw_spin_lock+0x121/0x260 [ 845.253113] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 845.253601] ? rwlock_bug.part.0+0x90/0x90 [ 845.253971] jbd2_journal_flush+0x14b/0x530 [ 845.254353] __ext4_ioctl+0x2cd9/0x4190 [ 845.254706] ? ext4_reset_inode_seed+0x450/0x450 [ 845.255112] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 845.255566] ? find_held_lock+0x2c/0x110 [ 845.255928] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 845.256425] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 845.256871] ? do_vfs_ioctl+0x283/0x10d0 [ 845.257224] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 845.257676] ? generic_block_fiemap+0x60/0x60 [ 845.258063] ? lock_downgrade+0x6d0/0x6d0 [ 845.258427] ? __mutex_unlock_slowpath+0xe1/0x600 [ 845.258845] ? wait_for_completion_io+0x270/0x270 [ 845.259267] ? selinux_file_ioctl+0xb6/0x270 [ 845.259658] ? __ext4_ioctl+0x4190/0x4190 [ 845.260015] __x64_sys_ioctl+0x19a/0x210 [ 845.260367] do_syscall_64+0x33/0x40 [ 845.260690] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 845.261134] RIP: 0033:0x7fd6e335db19 [ 845.261456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.263030] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 845.263683] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 845.264290] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 845.264892] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 845.265499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 845.266103] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:13:20 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xa000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xa000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 35) 22:13:20 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xf0ffff, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:20 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 845.540237] FAULT_INJECTION: forcing a failure. [ 845.540237] name failslab, interval 1, probability 0, space 0, times 0 [ 845.542346] CPU: 0 PID: 6904 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 845.542886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 845.543555] Call Trace: [ 845.543771] dump_stack+0x107/0x167 [ 845.544065] should_fail.cold+0x5/0xa [ 845.544382] ? mempool_alloc+0x148/0x360 [ 845.544705] ? mempool_free_pages+0x20/0x20 [ 845.545058] should_failslab+0x5/0x20 [ 845.545376] kmem_cache_alloc+0x5b/0x310 [ 845.545707] ? mempool_free_pages+0x20/0x20 [ 845.546056] mempool_alloc+0x148/0x360 [ 845.546378] ? mempool_resize+0x7d0/0x7d0 [ 845.546715] ? lock_acquire+0x197/0x470 [ 845.547031] ? find_held_lock+0x2c/0x110 [ 845.547367] bio_alloc_bioset+0x36e/0x600 [ 845.547706] ? bvec_alloc+0x2f0/0x2f0 [ 845.548011] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 845.548435] ? trace_hardirqs_on+0x5b/0x180 [ 845.548777] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 845.549205] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 845.549590] write_dirty_buffer+0xcb/0x180 [ 845.549928] __flush_batch+0x116/0x2e0 [ 845.550249] ? jbd2_journal_skip_recovery+0x160/0x160 [ 845.550663] ? lock_downgrade+0x6d0/0x6d0 [ 845.550998] jbd2_log_do_checkpoint+0x765/0xa00 [ 845.551377] ? do_raw_spin_lock+0x121/0x260 [ 845.551722] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 845.552169] ? rwlock_bug.part.0+0x90/0x90 [ 845.552511] jbd2_journal_flush+0x14b/0x530 [ 845.552860] __ext4_ioctl+0x2cd9/0x4190 [ 845.553185] ? ext4_reset_inode_seed+0x450/0x450 [ 845.553564] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 845.553984] ? find_held_lock+0x2c/0x110 [ 845.554316] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 845.554770] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 845.555183] ? do_vfs_ioctl+0x283/0x10d0 [ 845.555506] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 845.555918] ? generic_block_fiemap+0x60/0x60 [ 845.556271] ? lock_downgrade+0x6d0/0x6d0 [ 845.556607] ? __mutex_unlock_slowpath+0xe1/0x600 [ 845.556992] ? wait_for_completion_io+0x270/0x270 [ 845.557387] ? selinux_file_ioctl+0xb6/0x270 [ 845.557745] ? __ext4_ioctl+0x4190/0x4190 [ 845.558072] __x64_sys_ioctl+0x19a/0x210 [ 845.558397] do_syscall_64+0x33/0x40 [ 845.558693] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 845.559098] RIP: 0033:0x7fd6e335db19 [ 845.559391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.560836] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 845.561446] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 845.562013] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 845.562580] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 845.563135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 845.563708] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:13:20 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x8b6e15a3, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 36) 22:13:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x9effffff, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x1000000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 845.746699] FAULT_INJECTION: forcing a failure. [ 845.746699] name failslab, interval 1, probability 0, space 0, times 0 [ 845.748695] CPU: 1 PID: 6923 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 845.749727] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 845.750964] Call Trace: [ 845.751373] dump_stack+0x107/0x167 [ 845.751931] should_fail.cold+0x5/0xa [ 845.752501] ? create_object.isra.0+0x3a/0xa20 [ 845.753182] should_failslab+0x5/0x20 [ 845.753748] kmem_cache_alloc+0x5b/0x310 [ 845.754361] create_object.isra.0+0x3a/0xa20 [ 845.755023] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 845.755780] kmem_cache_alloc+0x159/0x310 [ 845.756402] ? mempool_free_pages+0x20/0x20 [ 845.757027] mempool_alloc+0x148/0x360 [ 845.757620] ? mempool_resize+0x7d0/0x7d0 [ 845.758250] ? lock_acquire+0x197/0x470 [ 845.758836] ? find_held_lock+0x2c/0x110 [ 845.759461] bio_alloc_bioset+0x36e/0x600 [ 845.760072] ? submit_bio_noacct+0x1010/0x1010 [ 845.760750] ? bvec_alloc+0x2f0/0x2f0 [ 845.761340] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 845.762076] write_dirty_buffer+0xcb/0x180 [ 845.762709] __flush_batch+0x116/0x2e0 [ 845.763293] ? jbd2_journal_skip_recovery+0x160/0x160 [ 845.764053] ? lock_downgrade+0x6d0/0x6d0 [ 845.764709] jbd2_log_do_checkpoint+0x765/0xa00 [ 845.765395] ? do_raw_spin_lock+0x121/0x260 [ 845.766053] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 845.766913] ? rwlock_bug.part.0+0x90/0x90 [ 845.767548] jbd2_journal_flush+0x14b/0x530 [ 845.768213] __ext4_ioctl+0x2cd9/0x4190 [ 845.768834] ? ext4_reset_inode_seed+0x450/0x450 [ 845.769553] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 845.770316] ? find_held_lock+0x2c/0x110 [ 845.770948] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 845.771796] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 845.772584] ? do_vfs_ioctl+0x283/0x10d0 [ 845.773202] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 845.773997] ? generic_block_fiemap+0x60/0x60 [ 845.774647] ? lock_downgrade+0x6d0/0x6d0 [ 845.775283] ? __mutex_unlock_slowpath+0xe1/0x600 [ 845.775993] ? wait_for_completion_io+0x270/0x270 [ 845.776736] ? selinux_file_ioctl+0xb6/0x270 [ 845.777384] ? __ext4_ioctl+0x4190/0x4190 [ 845.778017] __x64_sys_ioctl+0x19a/0x210 [ 845.778614] do_syscall_64+0x33/0x40 [ 845.779182] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 845.779933] RIP: 0033:0x7fd6e335db19 [ 845.780498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.783287] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 845.784439] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 845.785497] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 845.786572] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 845.787661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 845.788737] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:13:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:33 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x34000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xa3156e8b, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 37) 22:13:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x2000000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:33 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 857.945680] FAULT_INJECTION: forcing a failure. [ 857.945680] name failslab, interval 1, probability 0, space 0, times 0 [ 857.946716] CPU: 0 PID: 6950 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 857.947295] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 857.947997] Call Trace: [ 857.948230] dump_stack+0x107/0x167 [ 857.948535] should_fail.cold+0x5/0xa [ 857.948857] ? mempool_alloc+0x148/0x360 [ 857.949193] ? mempool_free_pages+0x20/0x20 [ 857.949556] should_failslab+0x5/0x20 [ 857.949870] kmem_cache_alloc+0x5b/0x310 [ 857.950213] ? mempool_free_pages+0x20/0x20 [ 857.950567] mempool_alloc+0x148/0x360 [ 857.950899] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 857.951361] ? mempool_resize+0x7d0/0x7d0 [ 857.951724] ? lock_acquire+0x197/0x470 [ 857.952058] ? find_held_lock+0x2c/0x110 [ 857.952419] bio_alloc_bioset+0x36e/0x600 [ 857.952762] ? trace_hardirqs_on+0x5b/0x180 [ 857.953128] ? bvec_alloc+0x2f0/0x2f0 [ 857.953457] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 857.953866] ? rcu_all_qs+0x7/0xb0 [ 857.954168] write_dirty_buffer+0xcb/0x180 [ 857.954528] __flush_batch+0x116/0x2e0 [ 857.954859] ? jbd2_journal_skip_recovery+0x160/0x160 [ 857.955298] ? lock_downgrade+0x6d0/0x6d0 [ 857.955653] ? jbd2_journal_put_journal_head+0x38a/0x560 [ 857.956114] jbd2_log_do_checkpoint+0x765/0xa00 [ 857.956505] ? do_raw_spin_lock+0x121/0x260 [ 857.956868] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 857.957352] ? rwlock_bug.part.0+0x90/0x90 [ 857.957710] ? do_raw_spin_unlock+0x4f/0x220 [ 857.958082] jbd2_journal_flush+0x14b/0x530 [ 857.958446] __ext4_ioctl+0x2cd9/0x4190 [ 857.958779] ? ext4_reset_inode_seed+0x450/0x450 [ 857.959173] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 857.959605] ? find_held_lock+0x2c/0x110 [ 857.959955] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 857.960435] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 857.960866] ? do_vfs_ioctl+0x283/0x10d0 [ 857.961222] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 857.961666] ? generic_block_fiemap+0x60/0x60 [ 857.962037] ? lock_downgrade+0x6d0/0x6d0 [ 857.962398] ? __mutex_unlock_slowpath+0xe1/0x600 [ 857.962815] ? wait_for_completion_io+0x270/0x270 [ 857.963231] ? selinux_file_ioctl+0xb6/0x270 [ 857.963598] ? __ext4_ioctl+0x4190/0x4190 [ 857.963950] __x64_sys_ioctl+0x19a/0x210 [ 857.964284] do_syscall_64+0x33/0x40 [ 857.964594] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 857.965021] RIP: 0033:0x7fd6e335db19 [ 857.965337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 857.966828] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 857.967470] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 857.968058] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 857.968663] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 857.969259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 857.969843] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:13:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x3000000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf0ffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:33 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 38) 22:13:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x9000000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 858.173624] FAULT_INJECTION: forcing a failure. [ 858.173624] name failslab, interval 1, probability 0, space 0, times 0 [ 858.174901] CPU: 0 PID: 6961 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 858.175443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 858.176113] Call Trace: [ 858.176330] dump_stack+0x107/0x167 [ 858.176624] should_fail.cold+0x5/0xa [ 858.176927] ? create_object.isra.0+0x3a/0xa20 [ 858.177297] should_failslab+0x5/0x20 [ 858.177603] kmem_cache_alloc+0x5b/0x310 [ 858.177927] create_object.isra.0+0x3a/0xa20 [ 858.178278] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 858.178680] kmem_cache_alloc+0x159/0x310 [ 858.179016] ? mempool_free_pages+0x20/0x20 [ 858.179360] mempool_alloc+0x148/0x360 [ 858.179679] ? mempool_resize+0x7d0/0x7d0 [ 858.180024] bio_alloc_bioset+0x36e/0x600 [ 858.180356] ? submit_bio_noacct+0x1010/0x1010 [ 858.180720] ? bvec_alloc+0x2f0/0x2f0 [ 858.181035] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 858.181432] write_dirty_buffer+0xcb/0x180 [ 858.181772] __flush_batch+0x116/0x2e0 [ 858.182088] ? jbd2_journal_skip_recovery+0x160/0x160 [ 858.182501] ? lock_downgrade+0x6d0/0x6d0 [ 858.182829] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 858.183276] jbd2_log_do_checkpoint+0x765/0xa00 [ 858.183653] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 858.184103] ? mutex_lock_io_nested+0x4f1/0xf30 [ 858.184478] jbd2_journal_flush+0x14b/0x530 [ 858.184827] __ext4_ioctl+0x2cd9/0x4190 [ 858.185152] ? ext4_reset_inode_seed+0x450/0x450 [ 858.185529] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 858.185945] ? find_held_lock+0x2c/0x110 [ 858.186282] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 858.186743] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 858.187157] ? do_vfs_ioctl+0x283/0x10d0 [ 858.187482] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 858.187900] ? generic_block_fiemap+0x60/0x60 [ 858.188255] ? lock_downgrade+0x6d0/0x6d0 [ 858.188585] ? __mutex_unlock_slowpath+0xe1/0x600 [ 858.188969] ? wait_for_completion_io+0x270/0x270 [ 858.189362] ? selinux_file_ioctl+0xb6/0x270 [ 858.189716] ? __ext4_ioctl+0x4190/0x4190 [ 858.190047] __x64_sys_ioctl+0x19a/0x210 [ 858.190371] do_syscall_64+0x33/0x40 [ 858.190667] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 858.191071] RIP: 0033:0x7fd6e335db19 [ 858.191369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 858.192823] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 858.193431] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 858.193995] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 858.194558] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 858.195119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 858.195694] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:13:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:45 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:45 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xfffff000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 39) 22:13:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xf000000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 870.500815] FAULT_INJECTION: forcing a failure. [ 870.500815] name failslab, interval 1, probability 0, space 0, times 0 [ 870.501941] CPU: 0 PID: 6991 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 870.502499] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 870.503171] Call Trace: [ 870.503393] dump_stack+0x107/0x167 [ 870.503704] should_fail.cold+0x5/0xa [ 870.504024] ? mempool_alloc+0x148/0x360 [ 870.504360] ? mempool_free_pages+0x20/0x20 [ 870.504721] should_failslab+0x5/0x20 [ 870.505030] kmem_cache_alloc+0x5b/0x310 [ 870.505370] ? mempool_free_pages+0x20/0x20 [ 870.505728] mempool_alloc+0x148/0x360 [ 870.506058] ? mempool_resize+0x7d0/0x7d0 [ 870.506406] ? lock_acquire+0x197/0x470 [ 870.506733] ? find_held_lock+0x2c/0x110 [ 870.507069] bio_alloc_bioset+0x36e/0x600 [ 870.507411] ? submit_bio_noacct+0x1010/0x1010 [ 870.507798] ? bvec_alloc+0x2f0/0x2f0 [ 870.508115] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 870.508517] write_dirty_buffer+0xcb/0x180 [ 870.508860] __flush_batch+0x116/0x2e0 [ 870.509192] ? jbd2_journal_skip_recovery+0x160/0x160 [ 870.509607] ? lock_downgrade+0x6d0/0x6d0 [ 870.509951] jbd2_log_do_checkpoint+0x765/0xa00 [ 870.510339] ? do_raw_spin_lock+0x121/0x260 [ 870.510697] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 870.511157] ? rwlock_bug.part.0+0x90/0x90 [ 870.511503] jbd2_journal_flush+0x14b/0x530 [ 870.511868] __ext4_ioctl+0x2cd9/0x4190 [ 870.512206] ? ext4_reset_inode_seed+0x450/0x450 [ 870.512609] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 870.513036] ? find_held_lock+0x2c/0x110 [ 870.513380] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 870.513852] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 870.514280] ? do_vfs_ioctl+0x283/0x10d0 [ 870.514607] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 870.515047] ? generic_block_fiemap+0x60/0x60 [ 870.515411] ? lock_downgrade+0x6d0/0x6d0 [ 870.515769] ? __mutex_unlock_slowpath+0xe1/0x600 [ 870.516169] ? wait_for_completion_io+0x270/0x270 [ 870.516567] ? selinux_file_ioctl+0xb6/0x270 [ 870.516933] ? __ext4_ioctl+0x4190/0x4190 [ 870.517287] __x64_sys_ioctl+0x19a/0x210 [ 870.517618] do_syscall_64+0x33/0x40 [ 870.517937] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 870.518357] RIP: 0033:0x7fd6e335db19 [ 870.518662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.520170] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 870.520789] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 870.521364] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 870.521938] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 870.522532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 870.523120] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:13:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x2531a0c8, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xffffff7f, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xffffff9e, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:46 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xfffffff0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:46 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x60000000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 40) 22:13:46 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xffffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 870.898683] FAULT_INJECTION: forcing a failure. [ 870.898683] name failslab, interval 1, probability 0, space 0, times 0 [ 870.900504] CPU: 1 PID: 7014 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 870.901516] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 870.902720] Call Trace: [ 870.903115] dump_stack+0x107/0x167 [ 870.903651] should_fail.cold+0x5/0xa [ 870.904216] ? create_object.isra.0+0x3a/0xa20 [ 870.904897] should_failslab+0x5/0x20 [ 870.905455] kmem_cache_alloc+0x5b/0x310 [ 870.906054] create_object.isra.0+0x3a/0xa20 [ 870.906702] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 870.907447] kmem_cache_alloc+0x159/0x310 [ 870.908069] ? mempool_free_pages+0x20/0x20 [ 870.908698] mempool_alloc+0x148/0x360 [ 870.909275] ? mempool_resize+0x7d0/0x7d0 [ 870.909878] ? lock_acquire+0x197/0x470 [ 870.910466] ? find_held_lock+0x2c/0x110 [ 870.911074] bio_alloc_bioset+0x36e/0x600 [ 870.911675] ? submit_bio_noacct+0x1010/0x1010 [ 870.912354] ? bvec_alloc+0x2f0/0x2f0 [ 870.912921] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 870.913647] write_dirty_buffer+0xcb/0x180 [ 870.914270] __flush_batch+0x116/0x2e0 [ 870.914850] ? jbd2_journal_skip_recovery+0x160/0x160 [ 870.915599] ? lock_downgrade+0x6d0/0x6d0 [ 870.916235] jbd2_log_do_checkpoint+0x765/0xa00 [ 870.916923] ? do_raw_spin_lock+0x121/0x260 [ 870.917561] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 870.918388] ? rwlock_bug.part.0+0x90/0x90 [ 870.919023] jbd2_journal_flush+0x14b/0x530 [ 870.919663] __ext4_ioctl+0x2cd9/0x4190 [ 870.920274] ? ext4_reset_inode_seed+0x450/0x450 [ 870.920969] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 870.921730] ? find_held_lock+0x2c/0x110 [ 870.922339] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 870.923172] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 870.923937] ? do_vfs_ioctl+0x283/0x10d0 [ 870.924533] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 870.925293] ? generic_block_fiemap+0x60/0x60 [ 870.925957] ? lock_downgrade+0x6d0/0x6d0 [ 870.926567] ? __mutex_unlock_slowpath+0xe1/0x600 [ 870.927283] ? wait_for_completion_io+0x270/0x270 [ 870.928014] ? selinux_file_ioctl+0xb6/0x270 [ 870.928677] ? __ext4_ioctl+0x4190/0x4190 [ 870.929304] __x64_sys_ioctl+0x19a/0x210 [ 870.929924] do_syscall_64+0x33/0x40 [ 870.930482] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 870.931243] RIP: 0033:0x7fd6e335db19 [ 870.931806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.934470] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 870.935571] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 870.936610] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 870.937636] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 870.938663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 870.939721] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:13:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r0, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x9effffff, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:59 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0xf, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 41) [ 883.760856] FAULT_INJECTION: forcing a failure. [ 883.760856] name failslab, interval 1, probability 0, space 0, times 0 [ 883.763218] CPU: 1 PID: 7034 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 883.764424] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 883.765867] Call Trace: [ 883.766342] dump_stack+0x107/0x167 [ 883.766982] should_fail.cold+0x5/0xa [ 883.767654] ? create_object.isra.0+0x3a/0xa20 [ 883.768468] should_failslab+0x5/0x20 [ 883.769146] kmem_cache_alloc+0x5b/0x310 [ 883.769869] create_object.isra.0+0x3a/0xa20 [ 883.770651] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 883.771550] kmem_cache_alloc+0x159/0x310 [ 883.772291] ? mempool_free_pages+0x20/0x20 [ 883.773042] mempool_alloc+0x148/0x360 [ 883.773726] ? mempool_resize+0x7d0/0x7d0 [ 883.774471] ? lock_acquire+0x197/0x470 [ 883.775175] ? find_held_lock+0x2c/0x110 [ 883.775918] bio_alloc_bioset+0x36e/0x600 [ 883.776641] ? submit_bio_noacct+0x1010/0x1010 [ 883.777441] ? bvec_alloc+0x2f0/0x2f0 [ 883.778120] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 883.778981] write_dirty_buffer+0xcb/0x180 [ 883.779731] __flush_batch+0x116/0x2e0 [ 883.780435] ? jbd2_journal_skip_recovery+0x160/0x160 [ 883.781348] ? lock_downgrade+0x6d0/0x6d0 [ 883.782100] jbd2_log_do_checkpoint+0x765/0xa00 [ 883.782934] ? do_raw_spin_lock+0x121/0x260 [ 883.783691] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 883.784685] ? rwlock_bug.part.0+0x90/0x90 [ 883.785318] jbd2_journal_flush+0x14b/0x530 [ 883.785960] __ext4_ioctl+0x2cd9/0x4190 [ 883.786555] ? ext4_reset_inode_seed+0x450/0x450 [ 883.787248] ? trace_hardirqs_on+0x5b/0x180 [ 883.787877] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 883.788670] ? ioctl_has_perm.constprop.0.isra.0+0x2a4/0x410 [ 883.789506] ? __sanitizer_cov_trace_pc+0x30/0x60 [ 883.790216] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 883.790969] ? do_vfs_ioctl+0x283/0x10d0 [ 883.791567] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 883.792342] ? generic_block_fiemap+0x60/0x60 [ 883.792994] ? lock_downgrade+0x6d0/0x6d0 [ 883.793607] ? __mutex_unlock_slowpath+0xe1/0x600 [ 883.794340] ? selinux_file_ioctl+0xb6/0x270 [ 883.794985] ? __ext4_ioctl+0x4190/0x4190 [ 883.795596] __x64_sys_ioctl+0x19a/0x210 [ 883.796199] do_syscall_64+0x33/0x40 [ 883.796749] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 883.797500] RIP: 0033:0x7fd6e335db19 [ 883.798049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 883.800749] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 883.801855] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 883.802889] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 883.803935] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 883.804976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 883.806019] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:13:59 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x14, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xc8a03125, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 42) 22:13:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xf0ffffff, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:13:59 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:13:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:13:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:13:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r0, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 884.071867] FAULT_INJECTION: forcing a failure. [ 884.071867] name failslab, interval 1, probability 0, space 0, times 0 [ 884.073863] CPU: 1 PID: 7049 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 884.074871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 884.076099] Call Trace: [ 884.076505] dump_stack+0x107/0x167 [ 884.077054] should_fail.cold+0x5/0xa [ 884.077627] ? create_object.isra.0+0x3a/0xa20 [ 884.078312] should_failslab+0x5/0x20 [ 884.078873] kmem_cache_alloc+0x5b/0x310 [ 884.079485] create_object.isra.0+0x3a/0xa20 [ 884.080147] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 884.080913] kmem_cache_alloc+0x159/0x310 [ 884.081533] ? mempool_free_pages+0x20/0x20 [ 884.082167] mempool_alloc+0x148/0x360 [ 884.082742] ? mempool_resize+0x7d0/0x7d0 [ 884.083368] ? lock_acquire+0x197/0x470 [ 884.083964] ? find_held_lock+0x2c/0x110 [ 884.084581] bio_alloc_bioset+0x36e/0x600 [ 884.085193] ? submit_bio_noacct+0x1010/0x1010 [ 884.085864] ? bvec_alloc+0x2f0/0x2f0 [ 884.086440] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 884.087173] write_dirty_buffer+0xcb/0x180 [ 884.087798] __flush_batch+0x116/0x2e0 [ 884.088385] ? jbd2_journal_skip_recovery+0x160/0x160 [ 884.089144] ? lock_downgrade+0x6d0/0x6d0 [ 884.089780] jbd2_log_do_checkpoint+0x765/0xa00 [ 884.090472] ? do_raw_spin_lock+0x121/0x260 [ 884.091113] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 884.091941] ? rwlock_bug.part.0+0x90/0x90 [ 884.092581] jbd2_journal_flush+0x14b/0x530 [ 884.093221] __ext4_ioctl+0x2cd9/0x4190 [ 884.093820] ? ext4_reset_inode_seed+0x450/0x450 [ 884.094520] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 884.095295] ? find_held_lock+0x2c/0x110 [ 884.095905] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 884.096766] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 884.097536] ? do_vfs_ioctl+0x283/0x10d0 [ 884.098138] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 884.098916] ? generic_block_fiemap+0x60/0x60 [ 884.099581] ? lock_downgrade+0x6d0/0x6d0 [ 884.100202] ? __mutex_unlock_slowpath+0xe1/0x600 [ 884.100933] ? wait_for_completion_io+0x270/0x270 [ 884.101655] ? selinux_file_ioctl+0xb6/0x270 [ 884.102308] ? __ext4_ioctl+0x4190/0x4190 [ 884.102927] __x64_sys_ioctl+0x19a/0x210 [ 884.103532] do_syscall_64+0x33/0x40 [ 884.104084] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 884.104837] RIP: 0033:0x7fd6e335db19 [ 884.105388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 884.108065] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 884.109192] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 884.110236] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 884.111284] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 884.112335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 884.113387] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 [ 892.284056] Bluetooth: hci7: command 0x0406 tx timeout 22:14:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0xec0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:14:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:14:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:14:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xfcffffff, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:14:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r0, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:14:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:14:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:14:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 43) 22:14:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xfffff000, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 898.318945] FAULT_INJECTION: forcing a failure. [ 898.318945] name failslab, interval 1, probability 0, space 0, times 0 [ 898.320910] CPU: 0 PID: 7076 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 898.321918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.323142] Call Trace: [ 898.323534] dump_stack+0x107/0x167 [ 898.324082] should_fail.cold+0x5/0xa [ 898.324656] ? mempool_alloc+0x148/0x360 [ 898.325259] ? mempool_free_pages+0x20/0x20 [ 898.325895] should_failslab+0x5/0x20 [ 898.326462] kmem_cache_alloc+0x5b/0x310 [ 898.327061] ? mempool_free_pages+0x20/0x20 [ 898.327701] mempool_alloc+0x148/0x360 [ 898.328297] ? mempool_resize+0x7d0/0x7d0 [ 898.328917] ? __lock_acquire+0x1657/0x5b00 [ 898.329570] bio_alloc_bioset+0x36e/0x600 [ 898.330181] ? bvec_alloc+0x2f0/0x2f0 [ 898.330756] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 898.331537] ? jbd2_journal_get_log_tail+0x186/0x4e0 [ 898.332299] ? lock_downgrade+0x6d0/0x6d0 [ 898.332923] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 898.333648] write_dirty_buffer+0xcb/0x180 [ 898.334286] __flush_batch+0x116/0x2e0 [ 898.334860] ? jbd2_journal_skip_recovery+0x160/0x160 [ 898.335628] ? lock_downgrade+0x6d0/0x6d0 [ 898.336259] ? jbd2_log_do_checkpoint+0xca/0xa00 [ 898.336958] jbd2_log_do_checkpoint+0x765/0xa00 [ 898.337659] ? do_raw_spin_lock+0x121/0x260 [ 898.338312] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 898.339143] ? rwlock_bug.part.0+0x90/0x90 [ 898.339777] jbd2_journal_flush+0x14b/0x530 [ 898.340436] __ext4_ioctl+0x2cd9/0x4190 [ 898.341037] ? ext4_reset_inode_seed+0x450/0x450 [ 898.341735] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 898.342494] ? find_held_lock+0x2c/0x110 [ 898.343106] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 898.343952] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 898.344722] ? do_vfs_ioctl+0x283/0x10d0 [ 898.345314] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 898.346075] ? generic_block_fiemap+0x60/0x60 [ 898.346743] ? lock_downgrade+0x6d0/0x6d0 [ 898.347353] ? __mutex_unlock_slowpath+0xe1/0x600 [ 898.348061] ? wait_for_completion_io+0x270/0x270 [ 898.348797] ? selinux_file_ioctl+0xb6/0x270 [ 898.349444] ? __ext4_ioctl+0x4190/0x4190 [ 898.350051] __x64_sys_ioctl+0x19a/0x210 [ 898.350633] do_syscall_64+0x33/0x40 [ 898.351184] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.351923] RIP: 0033:0x7fd6e335db19 [ 898.352474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 898.355098] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 898.356218] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 898.357246] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 898.358273] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 898.359299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 898.360323] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:14:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 44) 22:14:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:14:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 898.522331] FAULT_INJECTION: forcing a failure. [ 898.522331] name failslab, interval 1, probability 0, space 0, times 0 [ 898.523241] CPU: 1 PID: 7092 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 898.523755] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.524450] Call Trace: [ 898.524679] dump_stack+0x107/0x167 [ 898.524984] should_fail.cold+0x5/0xa [ 898.525308] ? trace_hardirqs_on+0x5b/0x180 [ 898.525672] ? create_object.isra.0+0x3a/0xa20 [ 898.526057] should_failslab+0x5/0x20 [ 898.526356] kmem_cache_alloc+0x5b/0x310 [ 898.526704] create_object.isra.0+0x3a/0xa20 [ 898.527067] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 898.527463] kmem_cache_alloc+0x159/0x310 [ 898.527776] ? mempool_free_pages+0x20/0x20 [ 898.528136] mempool_alloc+0x148/0x360 [ 898.528463] ? mempool_resize+0x7d0/0x7d0 [ 898.528818] ? lock_acquire+0x197/0x470 [ 898.529151] ? find_held_lock+0x2c/0x110 [ 898.529504] bio_alloc_bioset+0x36e/0x600 [ 898.529858] ? submit_bio_noacct+0x1010/0x1010 [ 898.530238] ? bvec_alloc+0x2f0/0x2f0 [ 898.530567] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 898.530972] write_dirty_buffer+0xcb/0x180 [ 898.531328] __flush_batch+0x116/0x2e0 [ 898.531660] ? jbd2_journal_skip_recovery+0x160/0x160 [ 898.532094] ? lock_downgrade+0x6d0/0x6d0 [ 898.532441] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 898.532900] jbd2_log_do_checkpoint+0x765/0xa00 [ 898.533300] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 898.533773] ? mutex_lock_io_nested+0x4f1/0xf30 [ 898.534161] jbd2_journal_flush+0x14b/0x530 [ 898.534540] __ext4_ioctl+0x2cd9/0x4190 [ 898.534882] ? ext4_reset_inode_seed+0x450/0x450 [ 898.535277] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 898.535716] ? find_held_lock+0x2c/0x110 [ 898.536065] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 898.536550] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 898.536980] ? do_vfs_ioctl+0x283/0x10d0 [ 898.537313] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 898.537749] ? generic_block_fiemap+0x60/0x60 [ 898.538130] ? lock_downgrade+0x6d0/0x6d0 [ 898.538472] ? __mutex_unlock_slowpath+0xe1/0x600 [ 898.538871] ? wait_for_completion_io+0x270/0x270 [ 898.539280] ? selinux_file_ioctl+0xb6/0x270 [ 898.539649] ? __ext4_ioctl+0x4190/0x4190 [ 898.539997] __x64_sys_ioctl+0x19a/0x210 [ 898.540349] do_syscall_64+0x33/0x40 [ 898.540652] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.541072] RIP: 0033:0x7fd6e335db19 [ 898.541383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 898.542883] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 898.543514] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 898.544102] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 898.544703] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 898.545299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 898.545883] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:14:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x33fe0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:14:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:14:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:14:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 45) 22:14:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xffffff7f, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:14:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:14:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:14:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:14:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x20000064, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 912.087300] FAULT_INJECTION: forcing a failure. [ 912.087300] name failslab, interval 1, probability 0, space 0, times 0 [ 912.089626] CPU: 1 PID: 7118 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 912.090883] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 912.092429] Call Trace: [ 912.092922] dump_stack+0x107/0x167 [ 912.093595] should_fail.cold+0x5/0xa [ 912.094294] ? mempool_alloc+0x148/0x360 [ 912.095039] ? mempool_free_pages+0x20/0x20 [ 912.095842] should_failslab+0x5/0x20 [ 912.096555] kmem_cache_alloc+0x5b/0x310 [ 912.097312] ? mempool_free_pages+0x20/0x20 [ 912.097953] mempool_alloc+0x148/0x360 [ 912.098673] ? mempool_resize+0x7d0/0x7d0 [ 912.099444] ? lock_acquire+0x197/0x470 [ 912.100172] ? find_held_lock+0x2c/0x110 [ 912.100952] bio_alloc_bioset+0x36e/0x600 [ 912.101714] ? submit_bio_noacct+0x1010/0x1010 [ 912.102543] ? bvec_alloc+0x2f0/0x2f0 [ 912.103276] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 912.104186] write_dirty_buffer+0xcb/0x180 [ 912.104891] __flush_batch+0x116/0x2e0 [ 912.105602] ? jbd2_journal_skip_recovery+0x160/0x160 [ 912.106544] ? lock_downgrade+0x6d0/0x6d0 [ 912.107309] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 912.108336] jbd2_log_do_checkpoint+0x765/0xa00 [ 912.109202] ? do_raw_spin_lock+0x121/0x260 [ 912.109995] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 912.111029] ? rwlock_bug.part.0+0x90/0x90 [ 912.111834] jbd2_journal_flush+0x14b/0x530 [ 912.112669] __ext4_ioctl+0x2cd9/0x4190 [ 912.113422] ? ext4_reset_inode_seed+0x450/0x450 [ 912.114292] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 912.115246] ? find_held_lock+0x2c/0x110 [ 912.116017] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 912.117078] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 912.118019] ? do_vfs_ioctl+0x283/0x10d0 [ 912.118761] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 912.119726] ? generic_block_fiemap+0x60/0x60 [ 912.120566] ? lock_downgrade+0x6d0/0x6d0 [ 912.121253] ? __mutex_unlock_slowpath+0xe1/0x600 [ 912.122149] ? wait_for_completion_io+0x270/0x270 [ 912.122880] ? selinux_file_ioctl+0xb6/0x270 [ 912.123547] ? __ext4_ioctl+0x4190/0x4190 [ 912.124170] __x64_sys_ioctl+0x19a/0x210 [ 912.124797] do_syscall_64+0x33/0x40 [ 912.125364] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 912.126125] RIP: 0033:0x7fd6e335db19 [ 912.126695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 912.129390] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 912.130536] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 912.131603] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 912.132673] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 912.133736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 912.134785] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:14:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 46) 22:14:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:14:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xffffff9e, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:14:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:14:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:14:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:14:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:14:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x7ffff000, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 924.036690] FAULT_INJECTION: forcing a failure. [ 924.036690] name failslab, interval 1, probability 0, space 0, times 0 [ 924.038594] CPU: 0 PID: 7132 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 924.039576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 924.040799] Call Trace: [ 924.041183] dump_stack+0x107/0x167 [ 924.041729] should_fail.cold+0x5/0xa [ 924.042293] ? mempool_alloc+0x148/0x360 [ 924.042895] ? mempool_free_pages+0x20/0x20 [ 924.043528] should_failslab+0x5/0x20 [ 924.044092] kmem_cache_alloc+0x5b/0x310 [ 924.044699] ? mempool_free_pages+0x20/0x20 [ 924.045334] mempool_alloc+0x148/0x360 [ 924.045909] ? mempool_resize+0x7d0/0x7d0 [ 924.046525] ? lock_acquire+0x197/0x470 [ 924.047105] ? find_held_lock+0x2c/0x110 [ 924.047722] bio_alloc_bioset+0x36e/0x600 [ 924.048332] ? submit_bio_noacct+0x1010/0x1010 [ 924.049000] ? bvec_alloc+0x2f0/0x2f0 [ 924.049574] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 924.050295] write_dirty_buffer+0xcb/0x180 [ 924.050923] __flush_batch+0x116/0x2e0 [ 924.051489] ? jbd2_journal_skip_recovery+0x160/0x160 [ 924.052246] ? lock_downgrade+0x6d0/0x6d0 [ 924.052884] jbd2_log_do_checkpoint+0x765/0xa00 [ 924.053578] ? do_raw_spin_lock+0x121/0x260 [ 924.054220] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 924.055039] ? rwlock_bug.part.0+0x90/0x90 [ 924.055667] jbd2_journal_flush+0x14b/0x530 [ 924.056314] __ext4_ioctl+0x2cd9/0x4190 [ 924.056919] ? ext4_reset_inode_seed+0x450/0x450 [ 924.057615] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 924.058375] ? find_held_lock+0x2c/0x110 [ 924.058988] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 924.059842] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 924.060601] ? do_vfs_ioctl+0x283/0x10d0 [ 924.061189] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 924.061967] ? generic_block_fiemap+0x60/0x60 [ 924.062611] ? lock_downgrade+0x6d0/0x6d0 [ 924.063226] ? __mutex_unlock_slowpath+0xe1/0x600 [ 924.063931] ? wait_for_completion_io+0x270/0x270 [ 924.064653] ? selinux_file_ioctl+0xb6/0x270 [ 924.065314] ? __ext4_ioctl+0x4190/0x4190 [ 924.065919] __x64_sys_ioctl+0x19a/0x210 [ 924.066525] do_syscall_64+0x33/0x40 [ 924.067074] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 924.067813] RIP: 0033:0x7fd6e335db19 [ 924.068351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.071039] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 924.072140] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 924.073173] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 924.074202] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 924.075222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 924.076250] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:14:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0xfffffdef, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:14:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 47) 22:14:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xfffffff0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:14:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x3, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:14:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:14:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 924.345945] FAULT_INJECTION: forcing a failure. [ 924.345945] name failslab, interval 1, probability 0, space 0, times 0 [ 924.347849] CPU: 0 PID: 7152 Comm: syz-executor.3 Not tainted 5.10.220 #1 22:14:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 924.348846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 924.350129] Call Trace: [ 924.350514] dump_stack+0x107/0x167 [ 924.351032] should_fail.cold+0x5/0xa [ 924.351591] ? stack_trace_consume_entry+0x160/0x160 [ 924.352309] ? create_object.isra.0+0x3a/0xa20 [ 924.352979] should_failslab+0x5/0x20 [ 924.353545] kmem_cache_alloc+0x5b/0x310 [ 924.354133] create_object.isra.0+0x3a/0xa20 [ 924.354755] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 924.355478] kmem_cache_alloc+0x159/0x310 [ 924.356087] ? mempool_free_pages+0x20/0x20 [ 924.356718] mempool_alloc+0x148/0x360 [ 924.357284] ? mempool_resize+0x7d0/0x7d0 [ 924.357883] ? lock_acquire+0x197/0x470 [ 924.358457] ? find_held_lock+0x2c/0x110 [ 924.359055] bio_alloc_bioset+0x36e/0x600 [ 924.359664] ? do_raw_spin_lock+0x121/0x260 [ 924.360281] ? bvec_alloc+0x2f0/0x2f0 [ 924.360854] ? kmem_cache_free+0xa7/0x2d0 [ 924.361475] blkdev_issue_flush+0x20/0x1a0 [ 924.362095] jbd2_cleanup_journal_tail+0x1ae/0x1f0 [ 924.362807] ? __flush_batch+0x2e0/0x2e0 [ 924.363402] ? __brelse+0x84/0xa0 [ 924.363920] ? do_raw_spin_unlock+0x4f/0x220 [ 924.364574] jbd2_log_do_checkpoint+0x4c1/0xa00 [ 924.365259] ? do_raw_spin_lock+0x121/0x260 [ 924.365885] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 924.366719] ? rwlock_bug.part.0+0x90/0x90 [ 924.367351] jbd2_journal_flush+0x14b/0x530 [ 924.367997] __ext4_ioctl+0x2cd9/0x4190 [ 924.368613] ? ext4_reset_inode_seed+0x450/0x450 [ 924.369316] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 924.370075] ? find_held_lock+0x2c/0x110 [ 924.370682] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 924.371519] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 924.372262] ? do_vfs_ioctl+0x283/0x10d0 [ 924.372860] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 924.373624] ? generic_block_fiemap+0x60/0x60 [ 924.374275] ? lock_downgrade+0x6d0/0x6d0 [ 924.374877] ? __mutex_unlock_slowpath+0xe1/0x600 [ 924.375576] ? wait_for_completion_io+0x270/0x270 [ 924.376297] ? selinux_file_ioctl+0xb6/0x270 [ 924.376940] ? __ext4_ioctl+0x4190/0x4190 [ 924.377536] __x64_sys_ioctl+0x19a/0x210 [ 924.378134] do_syscall_64+0x33/0x40 [ 924.378677] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 924.379422] RIP: 0033:0x7fd6e335db19 [ 924.379955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.382584] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 924.383678] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 924.384714] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 924.385732] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 924.386746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 924.387761] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:14:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xfffffffc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:14:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 48) [ 924.595336] FAULT_INJECTION: forcing a failure. [ 924.595336] name failslab, interval 1, probability 0, space 0, times 0 [ 924.597325] CPU: 1 PID: 7167 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 924.598311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 924.599496] Call Trace: [ 924.599886] dump_stack+0x107/0x167 [ 924.600432] should_fail.cold+0x5/0xa [ 924.600997] ? create_object.isra.0+0x3a/0xa20 [ 924.601657] should_failslab+0x5/0x20 [ 924.602202] kmem_cache_alloc+0x5b/0x310 [ 924.602802] create_object.isra.0+0x3a/0xa20 [ 924.603442] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 924.604175] kmem_cache_alloc+0x159/0x310 [ 924.604946] ? mempool_free_pages+0x20/0x20 [ 924.605575] mempool_alloc+0x148/0x360 [ 924.606292] ? mempool_resize+0x7d0/0x7d0 [ 924.606894] ? lock_acquire+0x197/0x470 [ 924.607616] ? find_held_lock+0x2c/0x110 [ 924.608221] bio_alloc_bioset+0x36e/0x600 [ 924.608991] ? submit_bio_noacct+0x1010/0x1010 [ 924.609656] ? bvec_alloc+0x2f0/0x2f0 [ 924.610367] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 924.611085] write_dirty_buffer+0xcb/0x180 [ 924.611850] __flush_batch+0x116/0x2e0 [ 924.612435] ? jbd2_journal_skip_recovery+0x160/0x160 [ 924.613367] ? lock_downgrade+0x6d0/0x6d0 [ 924.613994] jbd2_log_do_checkpoint+0x765/0xa00 [ 924.614853] ? do_raw_spin_lock+0x121/0x260 [ 924.615480] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 924.616507] ? rwlock_bug.part.0+0x90/0x90 [ 924.617197] jbd2_journal_flush+0x14b/0x530 [ 924.617975] __ext4_ioctl+0x2cd9/0x4190 [ 924.618568] ? ext4_reset_inode_seed+0x450/0x450 [ 924.619242] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 924.619985] ? find_held_lock+0x2c/0x110 [ 924.620593] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 924.621396] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 924.622123] ? do_vfs_ioctl+0x283/0x10d0 [ 924.622695] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 924.623431] ? generic_block_fiemap+0x60/0x60 [ 924.624063] ? lock_downgrade+0x6d0/0x6d0 [ 924.624665] ? __mutex_unlock_slowpath+0xe1/0x600 [ 924.625346] ? wait_for_completion_io+0x270/0x270 [ 924.626027] ? selinux_file_ioctl+0xb6/0x270 [ 924.626660] ? __ext4_ioctl+0x4190/0x4190 [ 924.627247] __x64_sys_ioctl+0x19a/0x210 [ 924.627819] do_syscall_64+0x33/0x40 [ 924.628345] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 924.629076] RIP: 0033:0x7fd6e335db19 [ 924.629736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.632256] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 924.633619] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 924.634684] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 924.635672] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 924.636671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 924.637659] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:14:52 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x8, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:14:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:14:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:14:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 49) 22:14:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:14:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0xffffffff, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:14:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) getdents(0xffffffffffffffff, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:14:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 937.321329] FAULT_INJECTION: forcing a failure. [ 937.321329] name failslab, interval 1, probability 0, space 0, times 0 [ 937.323232] CPU: 0 PID: 7190 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 937.324242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 937.325489] Call Trace: [ 937.325897] dump_stack+0x107/0x167 [ 937.326440] should_fail.cold+0x5/0xa [ 937.327008] ? create_object.isra.0+0x3a/0xa20 [ 937.327689] should_failslab+0x5/0x20 [ 937.328266] kmem_cache_alloc+0x5b/0x310 [ 937.328885] create_object.isra.0+0x3a/0xa20 [ 937.329537] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 937.330298] kmem_cache_alloc+0x159/0x310 [ 937.330891] ? mempool_free_pages+0x20/0x20 [ 937.331531] mempool_alloc+0x148/0x360 [ 937.332092] ? mempool_resize+0x7d0/0x7d0 [ 937.332731] ? lock_acquire+0x197/0x470 [ 937.333302] ? find_held_lock+0x2c/0x110 [ 937.333927] bio_alloc_bioset+0x36e/0x600 [ 937.334524] ? submit_bio_noacct+0x1010/0x1010 [ 937.335214] ? bvec_alloc+0x2f0/0x2f0 [ 937.335789] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 937.336522] write_dirty_buffer+0xcb/0x180 [ 937.337146] __flush_batch+0x116/0x2e0 [ 937.337718] ? jbd2_journal_skip_recovery+0x160/0x160 [ 937.338488] ? lock_downgrade+0x6d0/0x6d0 [ 937.339106] ? jbd2_log_do_checkpoint+0x36f/0xa00 [ 937.339820] jbd2_log_do_checkpoint+0x765/0xa00 [ 937.340526] ? do_raw_spin_lock+0x121/0x260 [ 937.341151] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 937.341989] ? rwlock_bug.part.0+0x90/0x90 [ 937.342613] jbd2_journal_flush+0x14b/0x530 [ 937.343278] __ext4_ioctl+0x2cd9/0x4190 [ 937.343867] ? ext4_reset_inode_seed+0x450/0x450 [ 937.344585] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 937.345356] ? find_held_lock+0x2c/0x110 [ 937.345975] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 937.346788] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 937.347549] ? do_vfs_ioctl+0x283/0x10d0 [ 937.348130] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 937.348904] ? generic_block_fiemap+0x60/0x60 [ 937.349542] ? lock_downgrade+0x6d0/0x6d0 [ 937.350153] ? __mutex_unlock_slowpath+0xe1/0x600 [ 937.350839] ? wait_for_completion_io+0x270/0x270 [ 937.351557] ? selinux_file_ioctl+0xb6/0x270 [ 937.352187] ? __ext4_ioctl+0x4190/0x4190 [ 937.352802] __x64_sys_ioctl+0x19a/0x210 [ 937.353380] do_syscall_64+0x33/0x40 [ 937.353929] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 937.354649] RIP: 0033:0x7fd6e335db19 [ 937.355195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.357765] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 937.358875] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 937.359881] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 937.360895] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 937.361897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 937.362901] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:14:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0xf, r2, 0x1}, 0x14}}, 0x0) 22:14:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 50) 22:14:52 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0xc, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 937.567295] FAULT_INJECTION: forcing a failure. [ 937.567295] name failslab, interval 1, probability 0, space 0, times 0 [ 937.569044] CPU: 1 PID: 7201 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 937.570052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 937.571272] Call Trace: [ 937.571669] dump_stack+0x107/0x167 [ 937.572224] should_fail.cold+0x5/0xa [ 937.572801] ? create_object.isra.0+0x3a/0xa20 [ 937.573489] should_failslab+0x5/0x20 [ 937.574062] kmem_cache_alloc+0x5b/0x310 [ 937.574680] create_object.isra.0+0x3a/0xa20 [ 937.575343] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 937.576111] kmem_cache_alloc+0x159/0x310 [ 937.576738] ? mempool_free_pages+0x20/0x20 [ 937.577381] mempool_alloc+0x148/0x360 [ 937.577968] ? mempool_resize+0x7d0/0x7d0 [ 937.578598] ? lock_acquire+0x197/0x470 [ 937.579197] ? jbd2_journal_flush+0x3d8/0x530 [ 937.579878] bio_alloc_bioset+0x36e/0x600 [ 937.580502] ? bvec_alloc+0x2f0/0x2f0 [ 937.581087] ? do_raw_spin_lock+0x121/0x260 [ 937.581727] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 937.582458] jbd2_write_superblock+0x371/0x8a0 [ 937.583130] ? jbd2_journal_abort+0x140/0x140 [ 937.583808] jbd2_mark_journal_empty+0x2d0/0x3f0 [ 937.584515] jbd2_journal_flush+0x1d0/0x530 [ 937.585174] __ext4_ioctl+0x2cd9/0x4190 [ 937.585780] ? ext4_reset_inode_seed+0x450/0x450 [ 937.586481] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 937.587252] ? find_held_lock+0x2c/0x110 [ 937.587877] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 937.588735] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 937.589506] ? do_vfs_ioctl+0x283/0x10d0 [ 937.590112] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 937.590886] ? generic_block_fiemap+0x60/0x60 [ 937.591559] ? lock_downgrade+0x6d0/0x6d0 [ 937.592182] ? __mutex_unlock_slowpath+0xe1/0x600 [ 937.592909] ? wait_for_completion_io+0x270/0x270 [ 937.593646] ? selinux_file_ioctl+0xb6/0x270 [ 937.594321] ? __ext4_ioctl+0x4190/0x4190 [ 937.594953] __x64_sys_ioctl+0x19a/0x210 [ 937.595565] do_syscall_64+0x33/0x40 [ 937.596125] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 937.596893] RIP: 0033:0x7fd6e335db19 [ 937.597466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.600180] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 937.601321] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 937.602377] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 937.603415] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 937.604474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 937.605526] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 22:15:05 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x500, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:15:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 1) 22:15:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0xc0, r2, 0x1}, 0x14}}, 0x0) 22:15:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:15:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 51) 22:15:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 949.803995] FAULT_INJECTION: forcing a failure. [ 949.803995] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 949.805138] CPU: 0 PID: 7215 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 949.805729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 949.806449] Call Trace: [ 949.806686] dump_stack+0x107/0x167 [ 949.806999] should_fail.cold+0x5/0xa [ 949.807338] _copy_from_user+0x2e/0x1b0 [ 949.807688] __copy_msghdr_from_user+0x91/0x4b0 [ 949.808093] ? __ia32_sys_shutdown+0x80/0x80 [ 949.808481] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 949.808953] ? __lock_acquire+0x1657/0x5b00 [ 949.809326] ? __lock_acquire+0xbb1/0x5b00 [ 949.809694] sendmsg_copy_msghdr+0xa1/0x160 [ 949.810068] ? do_recvmmsg+0x6d0/0x6d0 [ 949.810406] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 949.810856] ? lock_downgrade+0x6d0/0x6d0 [ 949.811218] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 949.811670] ___sys_sendmsg+0xc6/0x170 [ 949.812017] ? sendmsg_copy_msghdr+0x160/0x160 [ 949.812411] ? __fget_files+0x2cf/0x520 [ 949.812767] ? lock_downgrade+0x6d0/0x6d0 [ 949.813131] ? find_held_lock+0x2c/0x110 [ 949.813487] ? __fget_files+0x2f8/0x520 [ 949.813840] ? __fget_light+0xea/0x290 [ 949.814188] __sys_sendmsg+0xe5/0x1b0 [ 949.814521] ? __sys_sendmsg_sock+0x40/0x40 [ 949.814894] ? rcu_read_lock_any_held+0x75/0xa0 [ 949.815309] ? fput_many+0x2f/0x1a0 [ 949.815626] ? ksys_write+0x1a9/0x260 [ 949.815955] ? __ia32_sys_read+0xb0/0xb0 [ 949.816311] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 949.816779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 949.817225] ? trace_hardirqs_on+0x5b/0x180 [ 949.817599] do_syscall_64+0x33/0x40 [ 949.817921] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 949.818363] RIP: 0033:0x7f1092722b19 [ 949.818685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 949.820249] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 949.820918] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 949.821534] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 949.822145] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 949.822753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 949.823365] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:15:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 2) 22:15:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0xec0, r2, 0x1}, 0x14}}, 0x0) 22:15:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 949.899403] FAULT_INJECTION: forcing a failure. [ 949.899403] name failslab, interval 1, probability 0, space 0, times 0 [ 949.900398] CPU: 0 PID: 7222 Comm: syz-executor.3 Not tainted 5.10.220 #1 [ 949.900996] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 949.901707] Call Trace: [ 949.901951] dump_stack+0x107/0x167 [ 949.902285] should_fail.cold+0x5/0xa [ 949.902620] ? mempool_alloc+0x148/0x360 [ 949.902975] ? mempool_free_pages+0x20/0x20 [ 949.903352] should_failslab+0x5/0x20 [ 949.903683] kmem_cache_alloc+0x5b/0x310 [ 949.904046] ? mempool_free_pages+0x20/0x20 [ 949.904441] mempool_alloc+0x148/0x360 [ 949.904820] ? mempool_resize+0x7d0/0x7d0 [ 949.905189] ? lock_acquire+0x197/0x470 [ 949.905534] ? find_held_lock+0x2c/0x110 [ 949.905904] bio_alloc_bioset+0x36e/0x600 [ 949.906272] ? do_raw_spin_lock+0x121/0x260 [ 949.906659] ? bvec_alloc+0x2f0/0x2f0 [ 949.906987] ? kmem_cache_free+0xa7/0x2d0 [ 949.907366] blkdev_issue_flush+0x20/0x1a0 [ 949.907744] jbd2_cleanup_journal_tail+0x1ae/0x1f0 [ 949.908176] ? __flush_batch+0x2e0/0x2e0 [ 949.908527] ? __brelse+0x84/0xa0 [ 949.908859] ? do_raw_spin_unlock+0x4f/0x220 [ 949.909253] jbd2_log_do_checkpoint+0x4c1/0xa00 [ 949.909661] ? do_raw_spin_lock+0x121/0x260 [ 949.910033] ? __jbd2_journal_remove_checkpoint+0x5f0/0x5f0 [ 949.910506] ? rwlock_bug.part.0+0x90/0x90 [ 949.910883] ? do_raw_spin_unlock+0x4f/0x220 [ 949.911290] jbd2_journal_flush+0x14b/0x530 [ 949.911674] __ext4_ioctl+0x2cd9/0x4190 [ 949.912038] ? ext4_reset_inode_seed+0x450/0x450 [ 949.912448] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 949.912915] ? find_held_lock+0x2c/0x110 [ 949.913277] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 949.913747] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 949.914179] ? do_vfs_ioctl+0x283/0x10d0 [ 949.914517] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 949.914950] ? generic_block_fiemap+0x60/0x60 [ 949.915319] ? lock_downgrade+0x6d0/0x6d0 [ 949.915663] ? __mutex_unlock_slowpath+0xe1/0x600 [ 949.916064] ? wait_for_completion_io+0x270/0x270 [ 949.916477] ? selinux_file_ioctl+0xb6/0x270 [ 949.916860] ? __ext4_ioctl+0x4190/0x4190 [ 949.917219] __x64_sys_ioctl+0x19a/0x210 [ 949.917553] do_syscall_64+0x33/0x40 [ 949.917863] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 949.918277] RIP: 0033:0x7fd6e335db19 [ 949.918592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 949.920091] RSP: 002b:00007fd6e08d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 949.920733] RAX: ffffffffffffffda RBX: 00007fd6e3470f60 RCX: 00007fd6e335db19 [ 949.921341] RDX: 00000000200004c0 RSI: 0000000040086607 RDI: 0000000000000004 [ 949.921928] RBP: 00007fd6e08d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 949.922515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 949.923089] R13: 00007ffe5a6697bf R14: 00007fd6e08d3300 R15: 0000000000022000 [ 949.959188] FAULT_INJECTION: forcing a failure. [ 949.959188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 949.960987] CPU: 1 PID: 7226 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 949.961992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 949.963203] Call Trace: [ 949.963596] dump_stack+0x107/0x167 [ 949.964126] should_fail.cold+0x5/0xa [ 949.964687] _copy_from_user+0x2e/0x1b0 [ 949.965281] iovec_from_user+0x141/0x400 [ 949.965883] __import_iovec+0x67/0x590 [ 949.966456] ? __ia32_sys_shutdown+0x80/0x80 [ 949.967103] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 949.967851] import_iovec+0x83/0xb0 [ 949.968393] sendmsg_copy_msghdr+0x131/0x160 [ 949.969044] ? do_recvmmsg+0x6d0/0x6d0 [ 949.969618] ? lock_downgrade+0x6d0/0x6d0 [ 949.970211] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 949.970982] ___sys_sendmsg+0xc6/0x170 [ 949.971539] ? sendmsg_copy_msghdr+0x160/0x160 [ 949.972217] ? __fget_files+0x2cf/0x520 [ 949.972789] ? lock_downgrade+0x6d0/0x6d0 [ 949.973402] ? find_held_lock+0x2c/0x110 [ 949.973999] ? __fget_files+0x2f8/0x520 [ 949.974597] ? __fget_light+0xea/0x290 [ 949.975154] __sys_sendmsg+0xe5/0x1b0 [ 949.975720] ? __sys_sendmsg_sock+0x40/0x40 [ 949.976336] ? rcu_read_lock_any_held+0x75/0xa0 [ 949.977027] ? fput_many+0x2f/0x1a0 [ 949.977557] ? ksys_write+0x1a9/0x260 [ 949.978128] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 949.978873] ? syscall_enter_from_user_mode+0x1d/0x50 [ 949.979631] ? trace_hardirqs_on+0x5b/0x180 [ 949.980248] do_syscall_64+0x33/0x40 [ 949.980805] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 949.981529] RIP: 0033:0x7f1092722b19 [ 949.982086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 949.984673] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 949.985797] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 949.986843] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 949.987898] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 949.988950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 949.989998] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:15:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) (fail_nth: 52) 22:15:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x33fe0, r2, 0x1}, 0x14}}, 0x0) 22:15:05 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) 22:15:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x2, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:15:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x20000314, r2, 0x1}, 0x14}}, 0x0) 22:15:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x2, &(0x7f00000004c0)) 22:15:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x3, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:15:18 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:15:18 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x4b47, &(0x7f00000004c0)) 22:15:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x7ffff000, r2, 0x1}, 0x14}}, 0x0) 22:15:18 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 3) 22:15:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:15:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 963.322322] FAULT_INJECTION: forcing a failure. [ 963.322322] name failslab, interval 1, probability 0, space 0, times 0 [ 963.324013] CPU: 0 PID: 7273 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 963.325039] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 963.326267] Call Trace: [ 963.326669] dump_stack+0x107/0x167 [ 963.327203] should_fail.cold+0x5/0xa [ 963.327764] ? __alloc_skb+0x6d/0x5b0 [ 963.328335] should_failslab+0x5/0x20 [ 963.328901] kmem_cache_alloc_node+0x55/0x330 [ 963.329560] __alloc_skb+0x6d/0x5b0 [ 963.330108] netlink_sendmsg+0x998/0xdf0 [ 963.330707] ? netlink_unicast+0x7f0/0x7f0 [ 963.331327] ? netlink_unicast+0x7f0/0x7f0 [ 963.331969] __sock_sendmsg+0x154/0x190 [ 963.332550] ____sys_sendmsg+0x70d/0x870 [ 963.333177] ? sock_write_iter+0x3d0/0x3d0 [ 963.333791] ? do_recvmmsg+0x6d0/0x6d0 [ 963.334368] ? lock_downgrade+0x6d0/0x6d0 [ 963.334971] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 963.335749] ___sys_sendmsg+0xf3/0x170 [ 963.336330] ? sendmsg_copy_msghdr+0x160/0x160 [ 963.336992] ? __fget_files+0x2cf/0x520 [ 963.337578] ? lock_downgrade+0x6d0/0x6d0 [ 963.338176] ? find_held_lock+0x2c/0x110 [ 963.338772] ? __fget_files+0x2f8/0x520 [ 963.339356] ? __fget_light+0xea/0x290 [ 963.339934] __sys_sendmsg+0xe5/0x1b0 [ 963.340497] ? __sys_sendmsg_sock+0x40/0x40 [ 963.341140] ? rcu_read_lock_any_held+0x75/0xa0 [ 963.341835] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 963.342603] ? syscall_enter_from_user_mode+0x1d/0x50 [ 963.343342] ? trace_hardirqs_on+0x5b/0x180 [ 963.343976] do_syscall_64+0x33/0x40 [ 963.344534] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 963.345277] RIP: 0033:0x7f1092722b19 [ 963.345818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 963.348497] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 963.349621] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 963.350659] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 963.351706] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 963.352734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 963.353788] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:15:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x4, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:15:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0xfffffdef, r2, 0x1}, 0x14}}, 0x0) 22:15:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x4b49, &(0x7f00000004c0)) 22:15:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x5, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:15:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:18 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:18 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 4) 22:15:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x541b, &(0x7f00000004c0)) 22:15:18 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:15:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x6}, 0x14}}, 0x0) [ 963.666337] FAULT_INJECTION: forcing a failure. [ 963.666337] name failslab, interval 1, probability 0, space 0, times 0 [ 963.668061] CPU: 0 PID: 7296 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 963.669050] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 963.670210] Call Trace: [ 963.670593] dump_stack+0x107/0x167 [ 963.671117] should_fail.cold+0x5/0xa [ 963.671657] ? create_object.isra.0+0x3a/0xa20 [ 963.672295] should_failslab+0x5/0x20 [ 963.672829] kmem_cache_alloc+0x5b/0x310 [ 963.673406] create_object.isra.0+0x3a/0xa20 [ 963.674040] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 963.674775] kmem_cache_alloc_node+0x169/0x330 [ 963.675441] __alloc_skb+0x6d/0x5b0 [ 963.675983] netlink_sendmsg+0x998/0xdf0 [ 963.676593] ? netlink_unicast+0x7f0/0x7f0 [ 963.677195] ? netlink_unicast+0x7f0/0x7f0 [ 963.677792] __sock_sendmsg+0x154/0x190 [ 963.678369] ____sys_sendmsg+0x70d/0x870 [ 963.678939] ? sock_write_iter+0x3d0/0x3d0 [ 963.679538] ? do_recvmmsg+0x6d0/0x6d0 [ 963.680093] ? lock_downgrade+0x6d0/0x6d0 [ 963.680676] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 963.681441] ___sys_sendmsg+0xf3/0x170 [ 963.681991] ? sendmsg_copy_msghdr+0x160/0x160 [ 963.682640] ? __fget_files+0x2cf/0x520 [ 963.683209] ? lock_downgrade+0x6d0/0x6d0 [ 963.683791] ? find_held_lock+0x2c/0x110 [ 963.684379] ? __fget_files+0x2f8/0x520 [ 963.684945] ? __fget_light+0xea/0x290 [ 963.685498] __sys_sendmsg+0xe5/0x1b0 [ 963.686035] ? __sys_sendmsg_sock+0x40/0x40 [ 963.686645] ? rcu_read_lock_any_held+0x75/0xa0 [ 963.687326] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 963.688082] ? syscall_enter_from_user_mode+0x1d/0x50 [ 963.688808] ? trace_hardirqs_on+0x5b/0x180 [ 963.689435] do_syscall_64+0x33/0x40 [ 963.689955] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 963.690671] RIP: 0033:0x7f1092722b19 [ 963.691196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 963.693792] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 963.694880] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 963.695885] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 963.696878] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 963.697880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 963.698879] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:15:19 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x6, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:15:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:15:31 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:31 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:15:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x7, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:15:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5421, &(0x7f00000004c0)) 22:15:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x8}, 0x14}}, 0x0) 22:15:31 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 5) 22:15:31 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 975.798702] FAULT_INJECTION: forcing a failure. [ 975.798702] name failslab, interval 1, probability 0, space 0, times 0 [ 975.800443] CPU: 1 PID: 7316 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 975.801488] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 975.802704] Call Trace: [ 975.803101] dump_stack+0x107/0x167 [ 975.803638] should_fail.cold+0x5/0xa [ 975.804234] should_failslab+0x5/0x20 [ 975.804954] __kmalloc_node_track_caller+0x74/0x3b0 [ 975.805708] ? netlink_sendmsg+0x998/0xdf0 [ 975.806334] __alloc_skb+0xb1/0x5b0 [ 975.806881] netlink_sendmsg+0x998/0xdf0 [ 975.807488] ? netlink_unicast+0x7f0/0x7f0 [ 975.808114] ? netlink_unicast+0x7f0/0x7f0 [ 975.808711] __sock_sendmsg+0x154/0x190 [ 975.809314] ____sys_sendmsg+0x70d/0x870 [ 975.809911] ? sock_write_iter+0x3d0/0x3d0 [ 975.810529] ? do_recvmmsg+0x6d0/0x6d0 [ 975.811117] ? lock_downgrade+0x6d0/0x6d0 [ 975.811736] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 975.812505] ___sys_sendmsg+0xf3/0x170 [ 975.813093] ? sendmsg_copy_msghdr+0x160/0x160 [ 975.813780] ? __fget_files+0x2cf/0x520 [ 975.814371] ? lock_downgrade+0x6d0/0x6d0 [ 975.814976] ? find_held_lock+0x2c/0x110 [ 975.815575] ? __fget_files+0x2f8/0x520 [ 975.816166] ? __fget_light+0xea/0x290 [ 975.816747] __sys_sendmsg+0xe5/0x1b0 [ 975.817322] ? __sys_sendmsg_sock+0x40/0x40 [ 975.817952] ? rcu_read_lock_any_held+0x75/0xa0 [ 975.818648] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 975.819420] ? syscall_enter_from_user_mode+0x1d/0x50 [ 975.820166] ? trace_hardirqs_on+0x5b/0x180 [ 975.820800] do_syscall_64+0x33/0x40 [ 975.821367] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 975.822114] RIP: 0033:0x7f1092722b19 [ 975.822659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 975.825338] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 975.826447] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 975.827488] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 975.828527] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 975.829570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 975.830614] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:15:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:15:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x8, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:15:31 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 6) 22:15:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5450, &(0x7f00000004c0)) [ 976.017436] FAULT_INJECTION: forcing a failure. [ 976.017436] name failslab, interval 1, probability 0, space 0, times 0 [ 976.019212] CPU: 0 PID: 7340 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 976.020218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 976.021451] Call Trace: [ 976.021852] dump_stack+0x107/0x167 [ 976.022392] should_fail.cold+0x5/0xa [ 976.022953] ? create_object.isra.0+0x3a/0xa20 [ 976.023642] should_failslab+0x5/0x20 [ 976.024208] kmem_cache_alloc+0x5b/0x310 [ 976.024857] create_object.isra.0+0x3a/0xa20 [ 976.025511] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 976.026260] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 976.026998] ? netlink_sendmsg+0x998/0xdf0 [ 976.027626] __alloc_skb+0xb1/0x5b0 [ 976.028165] netlink_sendmsg+0x998/0xdf0 [ 976.028765] ? netlink_unicast+0x7f0/0x7f0 [ 976.029404] ? netlink_unicast+0x7f0/0x7f0 [ 976.030022] __sock_sendmsg+0x154/0x190 [ 976.030605] ____sys_sendmsg+0x70d/0x870 [ 976.031202] ? sock_write_iter+0x3d0/0x3d0 [ 976.031820] ? do_recvmmsg+0x6d0/0x6d0 [ 976.032396] ? lock_downgrade+0x6d0/0x6d0 [ 976.033007] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 976.033783] ___sys_sendmsg+0xf3/0x170 [ 976.034359] ? sendmsg_copy_msghdr+0x160/0x160 [ 976.035037] ? __fget_files+0x2cf/0x520 [ 976.035617] ? lock_downgrade+0x6d0/0x6d0 [ 976.036227] ? find_held_lock+0x2c/0x110 [ 976.036832] ? __fget_files+0x2f8/0x520 [ 976.037433] ? __fget_light+0xea/0x290 [ 976.038010] __sys_sendmsg+0xe5/0x1b0 [ 976.038567] ? __sys_sendmsg_sock+0x40/0x40 [ 976.039199] ? rcu_read_lock_any_held+0x75/0xa0 [ 976.039895] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 976.040664] ? syscall_enter_from_user_mode+0x1d/0x50 [ 976.041423] ? trace_hardirqs_on+0x5b/0x180 [ 976.042058] do_syscall_64+0x33/0x40 [ 976.042605] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 976.043354] RIP: 0033:0x7f1092722b19 [ 976.043897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 976.046577] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 976.047689] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 976.048729] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 976.049777] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 976.050819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 976.051858] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:15:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x2}, 0x14}}, 0x0) 22:15:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x9, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:15:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:45 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 7) 22:15:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:15:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5451, &(0x7f00000004c0)) 22:15:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:15:45 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x3}, 0x14}}, 0x0) [ 989.681656] FAULT_INJECTION: forcing a failure. [ 989.681656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 989.683405] CPU: 1 PID: 7361 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 989.684384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 989.685586] Call Trace: [ 989.685980] dump_stack+0x107/0x167 [ 989.686505] should_fail.cold+0x5/0xa [ 989.687058] _copy_from_iter_full+0x201/0xa60 [ 989.687707] ? __virt_addr_valid+0x170/0x5c0 [ 989.688346] ? __check_object_size+0x319/0x440 [ 989.689011] netlink_sendmsg+0x879/0xdf0 [ 989.689617] ? netlink_unicast+0x7f0/0x7f0 [ 989.690252] ? netlink_unicast+0x7f0/0x7f0 [ 989.690862] __sock_sendmsg+0x154/0x190 [ 989.691446] ____sys_sendmsg+0x70d/0x870 [ 989.692047] ? sock_write_iter+0x3d0/0x3d0 [ 989.692654] ? do_recvmmsg+0x6d0/0x6d0 [ 989.693230] ? lock_downgrade+0x6d0/0x6d0 [ 989.693831] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 989.694584] ___sys_sendmsg+0xf3/0x170 [ 989.695150] ? sendmsg_copy_msghdr+0x160/0x160 [ 989.695809] ? __fget_files+0x2cf/0x520 [ 989.696382] ? lock_downgrade+0x6d0/0x6d0 [ 989.696979] ? find_held_lock+0x2c/0x110 [ 989.697596] ? __fget_files+0x2f8/0x520 [ 989.698185] ? __fget_light+0xea/0x290 [ 989.698769] __sys_sendmsg+0xe5/0x1b0 [ 989.699337] ? __sys_sendmsg_sock+0x40/0x40 [ 989.699972] ? rcu_read_lock_any_held+0x75/0xa0 [ 989.700671] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 989.701446] ? syscall_enter_from_user_mode+0x1d/0x50 [ 989.702208] ? trace_hardirqs_on+0x5b/0x180 [ 989.702841] do_syscall_64+0x33/0x40 [ 989.703386] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 989.704145] RIP: 0033:0x7f1092722b19 [ 989.704695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.707386] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 989.708506] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 989.709556] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 989.710598] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.711652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 989.712698] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:15:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x8}, 0x14}}, 0x0) 22:15:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xa, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:15:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5452, &(0x7f00000004c0)) 22:15:45 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 8) 22:15:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5460, &(0x7f00000004c0)) 22:15:45 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x9}, 0x14}}, 0x0) 22:15:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xf, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 989.967590] FAULT_INJECTION: forcing a failure. [ 989.967590] name failslab, interval 1, probability 0, space 0, times 0 [ 989.969345] CPU: 0 PID: 7385 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 989.970365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 989.971584] Call Trace: [ 989.971980] dump_stack+0x107/0x167 [ 989.972513] should_fail.cold+0x5/0xa [ 989.973074] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 989.974031] should_failslab+0x5/0x20 [ 989.974586] __kmalloc+0x72/0x390 [ 989.975106] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 989.976038] genl_family_rcv_msg_doit+0xda/0x330 [ 989.976751] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 989.977928] ? cap_capable+0x1cd/0x230 [ 989.978514] ? security_capable+0x95/0xc0 [ 989.979132] ? ns_capable+0xe2/0x110 [ 989.979696] genl_rcv_msg+0x33c/0x5a0 [ 989.980264] ? genl_get_cmd+0x480/0x480 [ 989.980857] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 989.981606] ? lock_release+0x680/0x680 [ 989.982195] ? netlink_deliver_tap+0xf4/0xcc0 [ 989.982859] netlink_rcv_skb+0x14b/0x430 [ 989.983460] ? genl_get_cmd+0x480/0x480 [ 989.984043] ? netlink_ack+0xab0/0xab0 [ 989.984628] ? netlink_deliver_tap+0x1c4/0xcc0 [ 989.985303] ? is_vmalloc_addr+0x7b/0xb0 [ 989.985907] genl_rcv+0x24/0x40 [ 989.986390] netlink_unicast+0x549/0x7f0 [ 989.986998] ? netlink_attachskb+0x870/0x870 [ 989.987655] netlink_sendmsg+0x90f/0xdf0 [ 989.988266] ? netlink_unicast+0x7f0/0x7f0 [ 989.988895] ? netlink_unicast+0x7f0/0x7f0 [ 989.989535] __sock_sendmsg+0x154/0x190 [ 989.990119] ____sys_sendmsg+0x70d/0x870 [ 989.990726] ? sock_write_iter+0x3d0/0x3d0 [ 989.991346] ? do_recvmmsg+0x6d0/0x6d0 [ 989.991930] ? lock_downgrade+0x6d0/0x6d0 [ 989.992547] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 989.993334] ___sys_sendmsg+0xf3/0x170 [ 989.993907] ? sendmsg_copy_msghdr+0x160/0x160 [ 989.994591] ? __fget_files+0x2cf/0x520 [ 989.995178] ? lock_downgrade+0x6d0/0x6d0 [ 989.995799] ? find_held_lock+0x2c/0x110 [ 989.996405] ? __fget_files+0x2f8/0x520 [ 989.997007] ? __fget_light+0xea/0x290 [ 989.997593] __sys_sendmsg+0xe5/0x1b0 [ 989.998156] ? __sys_sendmsg_sock+0x40/0x40 [ 989.998787] ? rcu_read_lock_any_held+0x75/0xa0 [ 989.999489] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 990.000257] ? syscall_enter_from_user_mode+0x1d/0x50 [ 990.001015] ? trace_hardirqs_on+0x5b/0x180 [ 990.001651] do_syscall_64+0x33/0x40 [ 990.002204] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 990.002947] RIP: 0033:0x7f1092722b19 [ 990.003501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 990.006159] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 990.007279] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 990.008310] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 990.009339] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 990.010366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 990.011393] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:15:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:15:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:15:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xf0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xf}, 0x14}}, 0x0) 22:16:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:16:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 9) [ 1004.715798] FAULT_INJECTION: forcing a failure. [ 1004.715798] name failslab, interval 1, probability 0, space 0, times 0 [ 1004.717475] CPU: 0 PID: 7415 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 1004.718475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1004.719693] Call Trace: [ 1004.720087] dump_stack+0x107/0x167 [ 1004.720626] should_fail.cold+0x5/0xa [ 1004.721194] ? create_object.isra.0+0x3a/0xa20 [ 1004.721881] should_failslab+0x5/0x20 [ 1004.722444] kmem_cache_alloc+0x5b/0x310 [ 1004.723050] create_object.isra.0+0x3a/0xa20 [ 1004.723696] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1004.724443] __kmalloc+0x16e/0x390 [ 1004.724981] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 1004.725944] genl_family_rcv_msg_doit+0xda/0x330 [ 1004.726643] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1004.727615] ? cap_capable+0x1cd/0x230 [ 1004.728195] ? security_capable+0x95/0xc0 [ 1004.728808] ? ns_capable+0xe2/0x110 [ 1004.729359] genl_rcv_msg+0x33c/0x5a0 [ 1004.729928] ? genl_get_cmd+0x480/0x480 [ 1004.730512] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1004.731252] ? lock_release+0x680/0x680 [ 1004.731840] ? netlink_deliver_tap+0xf4/0xcc0 [ 1004.732502] netlink_rcv_skb+0x14b/0x430 [ 1004.733098] ? genl_get_cmd+0x480/0x480 [ 1004.733706] ? netlink_ack+0xab0/0xab0 [ 1004.734293] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1004.734967] ? is_vmalloc_addr+0x7b/0xb0 [ 1004.735566] genl_rcv+0x24/0x40 [ 1004.736049] netlink_unicast+0x549/0x7f0 [ 1004.736652] ? netlink_attachskb+0x870/0x870 [ 1004.737312] netlink_sendmsg+0x90f/0xdf0 [ 1004.737923] ? netlink_unicast+0x7f0/0x7f0 [ 1004.738558] ? netlink_unicast+0x7f0/0x7f0 [ 1004.739184] __sock_sendmsg+0x154/0x190 [ 1004.739773] ____sys_sendmsg+0x70d/0x870 [ 1004.740373] ? sock_write_iter+0x3d0/0x3d0 [ 1004.741013] ? do_recvmmsg+0x6d0/0x6d0 [ 1004.741608] ? lock_downgrade+0x6d0/0x6d0 [ 1004.742220] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1004.742996] ___sys_sendmsg+0xf3/0x170 [ 1004.743570] ? sendmsg_copy_msghdr+0x160/0x160 [ 1004.744247] ? __fget_files+0x2cf/0x520 [ 1004.744832] ? lock_downgrade+0x6d0/0x6d0 [ 1004.745449] ? find_held_lock+0x2c/0x110 [ 1004.746057] ? __fget_files+0x2f8/0x520 [ 1004.746648] ? __fget_light+0xea/0x290 [ 1004.747233] __sys_sendmsg+0xe5/0x1b0 [ 1004.747930] ? __sys_sendmsg_sock+0x40/0x40 [ 1004.748573] ? rcu_read_lock_any_held+0x75/0xa0 [ 1004.749284] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1004.750085] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1004.750851] ? trace_hardirqs_on+0x5b/0x180 [ 1004.751499] do_syscall_64+0x33/0x40 [ 1004.752054] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1004.752812] RIP: 0033:0x7f1092722b19 [ 1004.753379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1004.756101] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1004.757254] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 1004.758312] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 1004.759374] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1004.760427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1004.761505] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:16:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x300, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:00 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:16:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6609, &(0x7f00000004c0)) 22:16:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x660c, &(0x7f00000004c0)) 22:16:00 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:16:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x500, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x60}, 0x14}}, 0x0) 22:16:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 10) 22:16:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6611, &(0x7f00000004c0)) [ 1005.066909] FAULT_INJECTION: forcing a failure. [ 1005.066909] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.068750] CPU: 0 PID: 7443 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 1005.069785] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1005.071013] Call Trace: [ 1005.071406] dump_stack+0x107/0x167 [ 1005.071945] should_fail.cold+0x5/0xa [ 1005.072520] ? netlbl_mgmt_add_common+0x53/0x1870 [ 1005.073236] should_failslab+0x5/0x20 [ 1005.073804] kmem_cache_alloc_trace+0x55/0x320 [ 1005.074482] netlbl_mgmt_add_common+0x53/0x1870 [ 1005.075167] ? task_sid+0x139/0x2f0 [ 1005.075716] netlbl_mgmt_add+0x28a/0x3e0 [ 1005.076319] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1005.077055] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1005.078032] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1005.078990] genl_family_rcv_msg_doit+0x22d/0x330 [ 1005.079701] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1005.080691] ? ns_capable+0xe2/0x110 [ 1005.081245] genl_rcv_msg+0x33c/0x5a0 [ 1005.081811] ? genl_get_cmd+0x480/0x480 [ 1005.082393] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1005.083132] ? lock_release+0x680/0x680 [ 1005.083712] ? netlink_deliver_tap+0xf4/0xcc0 [ 1005.084375] netlink_rcv_skb+0x14b/0x430 [ 1005.084986] ? genl_get_cmd+0x480/0x480 [ 1005.085579] ? netlink_ack+0xab0/0xab0 [ 1005.086160] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1005.086832] ? is_vmalloc_addr+0x7b/0xb0 [ 1005.087434] genl_rcv+0x24/0x40 [ 1005.087916] netlink_unicast+0x549/0x7f0 [ 1005.088520] ? netlink_attachskb+0x870/0x870 [ 1005.089179] netlink_sendmsg+0x90f/0xdf0 [ 1005.089789] ? netlink_unicast+0x7f0/0x7f0 [ 1005.090422] ? netlink_unicast+0x7f0/0x7f0 [ 1005.091047] __sock_sendmsg+0x154/0x190 [ 1005.091633] ____sys_sendmsg+0x70d/0x870 [ 1005.092238] ? sock_write_iter+0x3d0/0x3d0 [ 1005.092864] ? do_recvmmsg+0x6d0/0x6d0 [ 1005.093452] ? lock_downgrade+0x6d0/0x6d0 [ 1005.094070] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1005.094846] ___sys_sendmsg+0xf3/0x170 [ 1005.095422] ? sendmsg_copy_msghdr+0x160/0x160 [ 1005.096100] ? __fget_files+0x2cf/0x520 [ 1005.096691] ? lock_downgrade+0x6d0/0x6d0 [ 1005.097302] ? find_held_lock+0x2c/0x110 [ 1005.097916] ? __fget_files+0x2f8/0x520 [ 1005.098508] ? __fget_light+0xea/0x290 [ 1005.099090] __sys_sendmsg+0xe5/0x1b0 [ 1005.099649] ? __sys_sendmsg_sock+0x40/0x40 [ 1005.100307] ? rcu_read_lock_any_held+0x75/0xa0 [ 1005.101010] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1005.101792] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1005.102547] ? trace_hardirqs_on+0x5b/0x180 [ 1005.103183] do_syscall_64+0x33/0x40 [ 1005.103730] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1005.104488] RIP: 0033:0x7f1092722b19 [ 1005.105039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1005.107727] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1005.108834] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 1005.109872] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 1005.110905] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.111937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1005.112975] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:16:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x600, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xf0}, 0x14}}, 0x0) 22:16:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x300}, 0x14}}, 0x0) 22:16:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x700, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 11) 22:16:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:16:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6612, &(0x7f00000004c0)) [ 1005.331052] FAULT_INJECTION: forcing a failure. [ 1005.331052] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.332111] CPU: 1 PID: 7463 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 1005.332755] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1005.333547] Call Trace: [ 1005.333800] dump_stack+0x107/0x167 [ 1005.334137] should_fail.cold+0x5/0xa [ 1005.334492] ? create_object.isra.0+0x3a/0xa20 [ 1005.334913] should_failslab+0x5/0x20 [ 1005.335265] kmem_cache_alloc+0x5b/0x310 [ 1005.335640] create_object.isra.0+0x3a/0xa20 [ 1005.336049] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1005.336516] kmem_cache_alloc_trace+0x151/0x320 [ 1005.336946] netlbl_mgmt_add_common+0x53/0x1870 [ 1005.337374] ? task_sid+0x139/0x2f0 [ 1005.337721] netlbl_mgmt_add+0x28a/0x3e0 [ 1005.338095] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1005.338557] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1005.339152] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1005.339752] genl_family_rcv_msg_doit+0x22d/0x330 [ 1005.340200] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1005.340813] ? ns_capable+0xe2/0x110 [ 1005.341162] genl_rcv_msg+0x33c/0x5a0 [ 1005.341523] ? genl_get_cmd+0x480/0x480 [ 1005.341888] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1005.342365] ? lock_release+0x680/0x680 [ 1005.342730] ? netlink_deliver_tap+0xf4/0xcc0 [ 1005.343153] netlink_rcv_skb+0x14b/0x430 [ 1005.343533] ? genl_get_cmd+0x480/0x480 [ 1005.343897] ? netlink_ack+0xab0/0xab0 [ 1005.344264] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1005.344688] ? is_vmalloc_addr+0x7b/0xb0 [ 1005.345065] genl_rcv+0x24/0x40 [ 1005.345367] netlink_unicast+0x549/0x7f0 [ 1005.345754] ? netlink_attachskb+0x870/0x870 [ 1005.346163] netlink_sendmsg+0x90f/0xdf0 [ 1005.346537] ? netlink_unicast+0x7f0/0x7f0 [ 1005.346929] ? netlink_unicast+0x7f0/0x7f0 [ 1005.347320] __sock_sendmsg+0x154/0x190 [ 1005.347682] ____sys_sendmsg+0x70d/0x870 [ 1005.348058] ? sock_write_iter+0x3d0/0x3d0 [ 1005.348444] ? do_recvmmsg+0x6d0/0x6d0 [ 1005.348810] ? lock_downgrade+0x6d0/0x6d0 [ 1005.349192] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1005.349674] ___sys_sendmsg+0xf3/0x170 [ 1005.350034] ? sendmsg_copy_msghdr+0x160/0x160 [ 1005.350453] ? __fget_files+0x2cf/0x520 [ 1005.350819] ? lock_downgrade+0x6d0/0x6d0 [ 1005.351199] ? find_held_lock+0x2c/0x110 [ 1005.351588] ? __fget_files+0x2f8/0x520 [ 1005.351959] ? __fget_light+0xea/0x290 [ 1005.352329] __sys_sendmsg+0xe5/0x1b0 [ 1005.352677] ? __sys_sendmsg_sock+0x40/0x40 [ 1005.353078] ? rcu_read_lock_any_held+0x75/0xa0 [ 1005.353522] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1005.354014] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1005.354487] ? trace_hardirqs_on+0x5b/0x180 [ 1005.354879] do_syscall_64+0x33/0x40 [ 1005.355223] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1005.355688] RIP: 0033:0x7f1092722b19 [ 1005.356038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1005.357706] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1005.358405] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 1005.359046] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 1005.359702] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.360350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1005.360988] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:16:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x900, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:16:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xa00, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6628, &(0x7f00000004c0)) 22:16:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 12) 22:16:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x900}, 0x14}}, 0x0) [ 1018.325303] FAULT_INJECTION: forcing a failure. [ 1018.325303] name failslab, interval 1, probability 0, space 0, times 0 [ 1018.326362] CPU: 1 PID: 7489 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 1018.326955] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1018.327668] Call Trace: [ 1018.327902] dump_stack+0x107/0x167 [ 1018.328223] should_fail.cold+0x5/0xa [ 1018.328552] ? netlbl_mgmt_add_common+0x17d/0x1870 [ 1018.328987] should_failslab+0x5/0x20 [ 1018.329318] __kmalloc+0x72/0x390 [ 1018.329632] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1018.330078] netlbl_mgmt_add_common+0x17d/0x1870 [ 1018.330492] ? task_sid+0x139/0x2f0 [ 1018.330817] netlbl_mgmt_add+0x28a/0x3e0 [ 1018.331170] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1018.331607] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1018.332184] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1018.332754] genl_family_rcv_msg_doit+0x22d/0x330 [ 1018.333175] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1018.333759] ? ns_capable+0xe2/0x110 [ 1018.334087] genl_rcv_msg+0x33c/0x5a0 [ 1018.334426] ? genl_get_cmd+0x480/0x480 [ 1018.334776] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1018.335212] ? lock_release+0x680/0x680 [ 1018.335558] ? netlink_deliver_tap+0xf4/0xcc0 [ 1018.335950] netlink_rcv_skb+0x14b/0x430 [ 1018.336308] ? genl_get_cmd+0x480/0x480 [ 1018.336650] ? netlink_ack+0xab0/0xab0 [ 1018.336991] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1018.337383] ? is_vmalloc_addr+0x7b/0xb0 [ 1018.337743] genl_rcv+0x24/0x40 [ 1018.338030] netlink_unicast+0x549/0x7f0 [ 1018.338385] ? netlink_attachskb+0x870/0x870 [ 1018.338767] netlink_sendmsg+0x90f/0xdf0 [ 1018.339126] ? netlink_unicast+0x7f0/0x7f0 [ 1018.339501] ? netlink_unicast+0x7f0/0x7f0 [ 1018.339868] __sock_sendmsg+0x154/0x190 [ 1018.340213] ____sys_sendmsg+0x70d/0x870 [ 1018.340570] ? sock_write_iter+0x3d0/0x3d0 [ 1018.340935] ? do_recvmmsg+0x6d0/0x6d0 [ 1018.341281] ___sys_sendmsg+0xf3/0x170 [ 1018.341636] ? sendmsg_copy_msghdr+0x160/0x160 [ 1018.342039] ? __fget_files+0x2cf/0x520 [ 1018.342385] ? lock_downgrade+0x6d0/0x6d0 [ 1018.342744] ? finish_task_switch+0x126/0x5d0 [ 1018.343132] ? lock_downgrade+0x6d0/0x6d0 [ 1018.343497] ? __fget_files+0x2f8/0x520 [ 1018.343843] ? __fget_light+0xea/0x290 [ 1018.344190] __sys_sendmsg+0xe5/0x1b0 [ 1018.344519] ? __sys_sendmsg_sock+0x40/0x40 [ 1018.344897] ? io_schedule_timeout+0x140/0x140 [ 1018.345298] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1018.345754] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1018.346195] ? trace_hardirqs_on+0x5b/0x180 [ 1018.346569] do_syscall_64+0x33/0x40 [ 1018.346890] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1018.347330] RIP: 0033:0x7f1092722b19 [ 1018.347648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1018.349203] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1018.349859] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 1018.350475] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 1018.351090] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1018.351705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1018.352315] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:16:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:16:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xf00}, 0x14}}, 0x0) 22:16:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xf00, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046629, &(0x7f00000004c0)) 22:16:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 13) 22:16:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 1018.532829] FAULT_INJECTION: forcing a failure. [ 1018.532829] name failslab, interval 1, probability 0, space 0, times 0 [ 1018.533788] CPU: 1 PID: 7510 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 1018.534329] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1018.535001] Call Trace: [ 1018.535222] dump_stack+0x107/0x167 [ 1018.535519] should_fail.cold+0x5/0xa [ 1018.535828] ? create_object.isra.0+0x3a/0xa20 [ 1018.536204] should_failslab+0x5/0x20 [ 1018.536514] kmem_cache_alloc+0x5b/0x310 [ 1018.536843] ? mark_held_locks+0x9e/0xe0 [ 1018.537177] create_object.isra.0+0x3a/0xa20 [ 1018.537536] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1018.537964] __kmalloc+0x16e/0x390 [ 1018.538259] netlbl_mgmt_add_common+0x17d/0x1870 [ 1018.538645] ? task_sid+0x139/0x2f0 [ 1018.538946] netlbl_mgmt_add+0x28a/0x3e0 [ 1018.539275] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1018.539693] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 1018.540226] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 1018.540757] genl_family_rcv_msg_doit+0x22d/0x330 [ 1018.541144] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 1018.541688] ? ns_capable+0xe2/0x110 [ 1018.541994] genl_rcv_msg+0x33c/0x5a0 [ 1018.542303] ? genl_get_cmd+0x480/0x480 [ 1018.542626] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1018.543040] ? lock_release+0x680/0x680 [ 1018.543360] ? netlink_deliver_tap+0xf4/0xcc0 [ 1018.543724] netlink_rcv_skb+0x14b/0x430 [ 1018.544054] ? genl_get_cmd+0x480/0x480 [ 1018.544374] ? netlink_ack+0xab0/0xab0 [ 1018.544695] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1018.545058] ? is_vmalloc_addr+0x7b/0xb0 [ 1018.545387] genl_rcv+0x24/0x40 [ 1018.545660] netlink_unicast+0x549/0x7f0 [ 1018.545996] ? netlink_attachskb+0x870/0x870 [ 1018.546356] netlink_sendmsg+0x90f/0xdf0 [ 1018.546689] ? netlink_unicast+0x7f0/0x7f0 [ 1018.547036] ? netlink_unicast+0x7f0/0x7f0 [ 1018.547385] __sock_sendmsg+0x154/0x190 [ 1018.547708] ____sys_sendmsg+0x70d/0x870 [ 1018.548043] ? sock_write_iter+0x3d0/0x3d0 [ 1018.548399] ? do_recvmmsg+0x6d0/0x6d0 [ 1018.548720] ? lock_downgrade+0x6d0/0x6d0 [ 1018.549062] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1018.549484] ___sys_sendmsg+0xf3/0x170 [ 1018.549807] ? sendmsg_copy_msghdr+0x160/0x160 [ 1018.550180] ? __fget_files+0x2cf/0x520 [ 1018.550501] ? lock_downgrade+0x6d0/0x6d0 [ 1018.550839] ? find_held_lock+0x2c/0x110 [ 1018.551175] ? __fget_files+0x2f8/0x520 [ 1018.551501] ? __fget_light+0xea/0x290 [ 1018.551817] __sys_sendmsg+0xe5/0x1b0 [ 1018.552127] ? __sys_sendmsg_sock+0x40/0x40 [ 1018.552481] ? rcu_read_lock_any_held+0x75/0xa0 [ 1018.552872] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1018.553304] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1018.553719] ? trace_hardirqs_on+0x5b/0x180 [ 1018.554074] do_syscall_64+0x33/0x40 [ 1018.554383] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1018.554801] RIP: 0033:0x7f1092722b19 [ 1018.555103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1018.556598] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1018.557218] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 1018.557796] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 1018.558366] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1018.558936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1018.559506] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:16:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:16:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xf000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:16:25 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 14) 22:16:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x6000}, 0x14}}, 0x0) 22:16:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40049409, &(0x7f00000004c0)) [ 1030.562718] FAULT_INJECTION: forcing a failure. [ 1030.562718] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.564742] CPU: 0 PID: 7528 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 1030.565756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1030.566967] Call Trace: [ 1030.567361] dump_stack+0x107/0x167 [ 1030.567897] should_fail.cold+0x5/0xa [ 1030.568456] ? __alloc_skb+0x6d/0x5b0 [ 1030.569020] should_failslab+0x5/0x20 [ 1030.569579] kmem_cache_alloc_node+0x55/0x330 [ 1030.570249] __alloc_skb+0x6d/0x5b0 [ 1030.570802] netlink_ack+0x1ed/0xab0 [ 1030.571359] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1030.572101] ? netlink_sendmsg+0xdf0/0xdf0 [ 1030.572745] ? lock_release+0x680/0x680 [ 1030.573341] ? netlink_deliver_tap+0xf4/0xcc0 [ 1030.574026] netlink_rcv_skb+0x348/0x430 [ 1030.574629] ? genl_get_cmd+0x480/0x480 [ 1030.575226] ? netlink_ack+0xab0/0xab0 [ 1030.575816] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1030.576499] ? is_vmalloc_addr+0x7b/0xb0 [ 1030.577102] genl_rcv+0x24/0x40 22:16:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xf000}, 0x14}}, 0x0) [ 1030.577590] netlink_unicast+0x549/0x7f0 [ 1030.578281] ? netlink_attachskb+0x870/0x870 [ 1030.578933] netlink_sendmsg+0x90f/0xdf0 [ 1030.579541] ? netlink_unicast+0x7f0/0x7f0 [ 1030.580176] ? netlink_unicast+0x7f0/0x7f0 [ 1030.580806] __sock_sendmsg+0x154/0x190 [ 1030.581386] ____sys_sendmsg+0x70d/0x870 [ 1030.582008] ? sock_write_iter+0x3d0/0x3d0 [ 1030.582646] ? do_recvmmsg+0x6d0/0x6d0 [ 1030.583230] ? lock_downgrade+0x6d0/0x6d0 [ 1030.583843] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1030.584615] ___sys_sendmsg+0xf3/0x170 [ 1030.585197] ? sendmsg_copy_msghdr+0x160/0x160 [ 1030.585884] ? __fget_files+0x2cf/0x520 [ 1030.586475] ? lock_downgrade+0x6d0/0x6d0 [ 1030.587082] ? find_held_lock+0x2c/0x110 [ 1030.587683] ? __fget_files+0x2f8/0x520 [ 1030.588278] ? __fget_light+0xea/0x290 [ 1030.588853] __sys_sendmsg+0xe5/0x1b0 [ 1030.589409] ? __sys_sendmsg_sock+0x40/0x40 [ 1030.590043] ? rcu_read_lock_any_held+0x75/0xa0 [ 1030.590740] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1030.591509] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1030.592256] ? trace_hardirqs_on+0x5b/0x180 [ 1030.592889] do_syscall_64+0x33/0x40 [ 1030.593433] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1030.594194] RIP: 0033:0x7f1092722b19 [ 1030.594740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1030.597396] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1030.598512] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 1030.599542] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 1030.600578] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1030.601619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1030.602648] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:16:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x30000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:16:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x30000}, 0x14}}, 0x0) 22:16:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086602, &(0x7f00000004c0)) 22:16:39 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 15) 22:16:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 1043.686699] FAULT_INJECTION: forcing a failure. [ 1043.686699] name failslab, interval 1, probability 0, space 0, times 0 [ 1043.688587] CPU: 1 PID: 7553 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 1043.689597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1043.690802] Call Trace: [ 1043.691197] dump_stack+0x107/0x167 [ 1043.691722] should_fail.cold+0x5/0xa [ 1043.692284] ? create_object.isra.0+0x3a/0xa20 [ 1043.692953] should_failslab+0x5/0x20 [ 1043.693512] kmem_cache_alloc+0x5b/0x310 [ 1043.694118] create_object.isra.0+0x3a/0xa20 [ 1043.694758] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1043.695497] kmem_cache_alloc_node+0x169/0x330 [ 1043.696172] __alloc_skb+0x6d/0x5b0 [ 1043.696711] netlink_ack+0x1ed/0xab0 [ 1043.697267] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1043.698002] ? netlink_sendmsg+0xdf0/0xdf0 [ 1043.698620] ? lock_release+0x680/0x680 [ 1043.699203] ? netlink_deliver_tap+0xf4/0xcc0 [ 1043.699860] netlink_rcv_skb+0x348/0x430 [ 1043.700454] ? genl_get_cmd+0x480/0x480 [ 1043.701040] ? netlink_ack+0xab0/0xab0 [ 1043.701618] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1043.702294] ? is_vmalloc_addr+0x7b/0xb0 [ 1043.702894] genl_rcv+0x24/0x40 [ 1043.703385] netlink_unicast+0x549/0x7f0 [ 1043.703987] ? netlink_attachskb+0x870/0x870 [ 1043.704637] netlink_sendmsg+0x90f/0xdf0 [ 1043.705238] ? netlink_unicast+0x7f0/0x7f0 [ 1043.705869] ? netlink_unicast+0x7f0/0x7f0 [ 1043.706501] __sock_sendmsg+0x154/0x190 [ 1043.707087] ____sys_sendmsg+0x70d/0x870 [ 1043.707686] ? sock_write_iter+0x3d0/0x3d0 [ 1043.708304] ? do_recvmmsg+0x6d0/0x6d0 [ 1043.708877] ? lock_downgrade+0x6d0/0x6d0 [ 1043.709483] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1043.710263] ___sys_sendmsg+0xf3/0x170 [ 1043.710836] ? sendmsg_copy_msghdr+0x160/0x160 [ 1043.711503] ? __fget_files+0x2cf/0x520 [ 1043.712085] ? lock_downgrade+0x6d0/0x6d0 [ 1043.712696] ? find_held_lock+0x2c/0x110 [ 1043.713304] ? __fget_files+0x2f8/0x520 [ 1043.713902] ? __fget_light+0xea/0x290 [ 1043.714485] __sys_sendmsg+0xe5/0x1b0 [ 1043.715043] ? __sys_sendmsg_sock+0x40/0x40 [ 1043.715670] ? rcu_read_lock_any_held+0x75/0xa0 [ 1043.716367] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1043.717130] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1043.717876] ? trace_hardirqs_on+0x5b/0x180 [ 1043.718509] do_syscall_64+0x33/0x40 [ 1043.719053] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1043.719795] RIP: 0033:0x7f1092722b19 [ 1043.720342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1043.723003] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1043.724119] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 1043.725153] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 1043.726193] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1043.727235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1043.728268] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:16:39 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 16) 22:16:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x34000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1043.794452] FAULT_INJECTION: forcing a failure. [ 1043.794452] name failslab, interval 1, probability 0, space 0, times 0 [ 1043.795418] CPU: 0 PID: 7568 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 1043.795996] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1043.796691] Call Trace: [ 1043.796920] dump_stack+0x107/0x167 [ 1043.797236] should_fail.cold+0x5/0xa [ 1043.797572] should_failslab+0x5/0x20 [ 1043.797905] __kmalloc_node_track_caller+0x74/0x3b0 [ 1043.798343] ? netlink_ack+0x1ed/0xab0 [ 1043.798672] __alloc_skb+0xb1/0x5b0 [ 1043.798975] netlink_ack+0x1ed/0xab0 [ 1043.799297] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1043.799719] ? netlink_sendmsg+0xdf0/0xdf0 [ 1043.800077] ? lock_release+0x680/0x680 [ 1043.800413] ? netlink_deliver_tap+0xf4/0xcc0 [ 1043.800786] netlink_rcv_skb+0x348/0x430 [ 1043.801125] ? genl_get_cmd+0x480/0x480 [ 1043.801455] ? netlink_ack+0xab0/0xab0 [ 1043.801783] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1043.802174] ? is_vmalloc_addr+0x7b/0xb0 [ 1043.802516] genl_rcv+0x24/0x40 [ 1043.802791] netlink_unicast+0x549/0x7f0 [ 1043.803138] ? netlink_attachskb+0x870/0x870 [ 1043.803505] netlink_sendmsg+0x90f/0xdf0 [ 1043.803844] ? netlink_unicast+0x7f0/0x7f0 [ 1043.804208] ? netlink_unicast+0x7f0/0x7f0 [ 1043.804562] __sock_sendmsg+0x154/0x190 [ 1043.804897] ____sys_sendmsg+0x70d/0x870 [ 1043.805247] ? sock_write_iter+0x3d0/0x3d0 [ 1043.805595] ? do_recvmmsg+0x6d0/0x6d0 [ 1043.805928] ? lock_downgrade+0x6d0/0x6d0 [ 1043.806291] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1043.806744] ___sys_sendmsg+0xf3/0x170 [ 1043.807073] ? sendmsg_copy_msghdr+0x160/0x160 [ 1043.807471] ? __fget_files+0x2cf/0x520 [ 1043.807797] ? lock_downgrade+0x6d0/0x6d0 [ 1043.808140] ? find_held_lock+0x2c/0x110 [ 1043.808486] ? __fget_files+0x2f8/0x520 [ 1043.808830] ? __fget_light+0xea/0x290 [ 1043.809173] __sys_sendmsg+0xe5/0x1b0 [ 1043.809508] ? __sys_sendmsg_sock+0x40/0x40 [ 1043.809882] ? rcu_read_lock_any_held+0x75/0xa0 [ 1043.810296] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1043.810734] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1043.811185] ? trace_hardirqs_on+0x5b/0x180 [ 1043.811563] do_syscall_64+0x33/0x40 [ 1043.811880] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1043.812317] RIP: 0033:0x7f1092722b19 [ 1043.812634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1043.814163] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1043.814792] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 1043.815372] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 1043.815956] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1043.816537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1043.817118] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:16:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:16:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x34000}, 0x14}}, 0x0) 22:16:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086604, &(0x7f00000004c0)) 22:16:39 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 17) 22:16:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x80000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1043.969555] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. [ 1043.976554] FAULT_INJECTION: forcing a failure. [ 1043.976554] name failslab, interval 1, probability 0, space 0, times 0 [ 1043.977588] CPU: 0 PID: 7580 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 1043.978147] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1043.978819] Call Trace: [ 1043.979050] dump_stack+0x107/0x167 [ 1043.979355] should_fail.cold+0x5/0xa [ 1043.979689] should_failslab+0x5/0x20 [ 1043.980010] __kmalloc_node_track_caller+0x74/0x3b0 [ 1043.980427] ? netlink_ack+0x1ed/0xab0 [ 1043.980751] __alloc_skb+0xb1/0x5b0 [ 1043.981055] netlink_ack+0x1ed/0xab0 [ 1043.981365] ? netlbl_mgmt_add_common+0x1870/0x1870 [ 1043.981779] ? netlink_sendmsg+0xdf0/0xdf0 [ 1043.982142] ? lock_release+0x680/0x680 [ 1043.982474] ? netlink_deliver_tap+0xf4/0xcc0 [ 1043.982857] netlink_rcv_skb+0x348/0x430 [ 1043.983200] ? genl_get_cmd+0x480/0x480 [ 1043.983528] ? netlink_ack+0xab0/0xab0 [ 1043.983851] ? netlink_deliver_tap+0x1c4/0xcc0 [ 1043.984227] ? is_vmalloc_addr+0x7b/0xb0 [ 1043.984560] genl_rcv+0x24/0x40 [ 1043.984833] netlink_unicast+0x549/0x7f0 [ 1043.985186] ? netlink_attachskb+0x870/0x870 [ 1043.985555] netlink_sendmsg+0x90f/0xdf0 [ 1043.985896] ? netlink_unicast+0x7f0/0x7f0 [ 1043.986245] ? netlink_unicast+0x7f0/0x7f0 [ 1043.986596] __sock_sendmsg+0x154/0x190 [ 1043.986922] ____sys_sendmsg+0x70d/0x870 [ 1043.987254] ? sock_write_iter+0x3d0/0x3d0 [ 1043.987596] ? do_recvmmsg+0x6d0/0x6d0 [ 1043.987915] ? lock_downgrade+0x6d0/0x6d0 [ 1043.988268] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1043.988694] ___sys_sendmsg+0xf3/0x170 [ 1043.989019] ? sendmsg_copy_msghdr+0x160/0x160 [ 1043.989399] ? __fget_files+0x2cf/0x520 [ 1043.989719] ? lock_downgrade+0x6d0/0x6d0 [ 1043.990060] ? find_held_lock+0x2c/0x110 [ 1043.990405] ? __fget_files+0x2f8/0x520 [ 1043.990735] ? __fget_light+0xea/0x290 [ 1043.991061] __sys_sendmsg+0xe5/0x1b0 [ 1043.991380] ? __sys_sendmsg_sock+0x40/0x40 [ 1043.991735] ? rcu_read_lock_any_held+0x75/0xa0 [ 1043.992124] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1043.992555] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1043.992973] ? trace_hardirqs_on+0x5b/0x180 [ 1043.993335] do_syscall_64+0x33/0x40 [ 1043.993646] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1043.994082] RIP: 0033:0x7f1092722b19 [ 1043.994403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1043.995894] RSP: 002b:00007f108fc98188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1043.996522] RAX: ffffffffffffffda RBX: 00007f1092835f60 RCX: 00007f1092722b19 [ 1043.997111] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000005 [ 1043.997691] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1043.998283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1043.998856] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:16:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x80000}, 0x14}}, 0x0) [ 1044.007399] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. 22:16:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x400300, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x4008660e, &(0x7f00000004c0)) 22:16:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) (fail_nth: 18) 22:16:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:16:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:16:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x400300}, 0x14}}, 0x0) [ 1055.770903] FAULT_INJECTION: forcing a failure. [ 1055.770903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1055.772807] CPU: 1 PID: 7597 Comm: syz-executor.1 Not tainted 5.10.220 #1 [ 1055.773844] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 22:16:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 1055.775108] Call Trace: [ 1055.775657] dump_stack+0x107/0x167 [ 1055.776178] should_fail.cold+0x5/0xa [ 1055.776729] _copy_to_user+0x2e/0x180 [ 1055.777278] simple_read_from_buffer+0xcc/0x160 [ 1055.777936] proc_fail_nth_read+0x198/0x230 [ 1055.778565] ? proc_sessionid_read+0x230/0x230 [ 1055.779213] ? security_file_permission+0xb1/0xe0 [ 1055.779897] ? proc_sessionid_read+0x230/0x230 [ 1055.780541] vfs_read+0x228/0x620 [ 1055.781043] ksys_read+0x12d/0x260 [ 1055.781561] ? vfs_write+0xb10/0xb10 [ 1055.782114] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1055.782849] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1055.783584] do_syscall_64+0x33/0x40 [ 1055.784112] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1055.784841] RIP: 0033:0x7f10926d569c [ 1055.785373] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1055.787980] RSP: 002b:00007f108fc98170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1055.789069] RAX: ffffffffffffffda RBX: 0000000000000024 RCX: 00007f10926d569c [ 1055.790092] RDX: 000000000000000f RSI: 00007f108fc981e0 RDI: 0000000000000003 [ 1055.791141] RBP: 00007f108fc981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1055.792141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1055.793153] R13: 00007ffef5017c2f R14: 00007f108fc98300 R15: 0000000000022000 22:16:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xf0ffff}, 0x14}}, 0x0) 22:16:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xf0ffff, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6609, &(0x7f00000004c0)) 22:16:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:16:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x1000000}, 0x14}}, 0x0) 22:16:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x1000000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40087602, &(0x7f00000004c0)) 22:17:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:17:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:17:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:03 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x2000000}, 0x14}}, 0x0) 22:17:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x2000000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1068.166462] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. [ 1068.182485] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. 22:17:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x3000000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:03 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x2, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x400c6615, &(0x7f00000004c0)) 22:17:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x3000000}, 0x14}}, 0x0) 22:17:03 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x4000000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x9000000}, 0x14}}, 0x0) 22:17:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:17:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40106614, &(0x7f00000004c0)) 22:17:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:17:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xf000000}, 0x14}}, 0x0) 22:17:15 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x5000000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:16 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x6000000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:16 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x2531a0c8}, 0x14}}, 0x0) 22:17:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x401c5820, &(0x7f00000004c0)) 22:17:16 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x4020940d, &(0x7f00000004c0)) 22:17:16 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x60000000}, 0x14}}, 0x0) 22:17:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:16 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x6, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40286608, &(0x7f00000004c0)) [ 1080.904752] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 0 (only 16 groups) [ 1080.969108] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 0 (only 16 groups) 22:17:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x7000000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40305828, &(0x7f00000004c0)) 22:17:28 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:17:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x7, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x9effffff}, 0x14}}, 0x0) 22:17:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:17:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xc8a03125}, 0x14}}, 0x0) 22:17:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x9000000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x8, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40305829, &(0x7f00000004c0)) 22:17:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xa000000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x9, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xf0ffffff}, 0x14}}, 0x0) 22:17:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x4030582a, &(0x7f00000004c0)) 22:17:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:42 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xf000000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:17:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x4030582b, &(0x7f00000004c0)) 22:17:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:17:42 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:42 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xfcffffff}, 0x14}}, 0x0) 22:17:43 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xfffff000}, 0x14}}, 0x0) 22:17:43 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40305839, &(0x7f00000004c0)) 22:17:43 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x8b6e15a3, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:43 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xffffff7f}, 0x14}}, 0x0) 22:17:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40806685, &(0x7f00000004c0)) 22:17:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:17:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, 0x0) ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xffffff9e}, 0x14}}, 0x0) 22:17:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:17:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x300, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x9effffff, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x500, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6609, &(0x7f00000004c0)) 22:17:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xfffffff0}, 0x14}}, 0x0) 22:17:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xa3156e8b, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x600, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:17:58 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:17:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x80086601, &(0x7f00000004c0)) 22:17:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xfffffffc}, 0x14}}, 0x0) 22:17:58 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xf0ffffff, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x700, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:18:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0xffffffff}, 0x14}}, 0x0) 22:18:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:18:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:18:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xfffff000, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, 0x0) ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:18:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x80086603, &(0x7f00000004c0)) 22:18:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xffffff7f, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x900, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:18:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x80087601, &(0x7f00000004c0)) 22:18:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xffffff9e, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf00, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x2}, 0x14}}, 0x0) 22:18:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x800c6613, &(0x7f00000004c0)) 22:18:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xfffffff0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:18:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x3}, 0x14}}, 0x0) 22:18:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x8010661b, &(0x7f00000004c0)) 22:18:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:18:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x8}, 0x14}}, 0x0) 22:18:28 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:18:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0xffffffff, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:18:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, 0x0) ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:18:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x30000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x9}, 0x14}}, 0x0) 22:18:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x801c581f, &(0x7f00000004c0)) 22:18:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:28 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:18:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:18:42 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xf}, 0x14}}, 0x0) 22:18:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0045878, &(0x7f00000004c0)) 22:18:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:18:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:18:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:18:42 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x2, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:18:42 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x34000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:42 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x80000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:42 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x3, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0045878, &(0x7f00000004c0)) 22:18:42 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x60}, 0x14}}, 0x0) 22:18:42 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x4, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:42 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x400300, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:43 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xf0}, 0x14}}, 0x0) 22:18:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0046686, &(0x7f00000004c0)) 22:18:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:18:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x5, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0096616, &(0x7f00000004c0)) 22:18:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x300}, 0x14}}, 0x0) 22:18:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:18:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf0ffff, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:18:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:18:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x6, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x900}, 0x14}}, 0x0) 22:18:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0185879, &(0x7f00000004c0)) 22:18:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x1000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xf00}, 0x14}}, 0x0) 22:18:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:18:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x7, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:18:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0189436, &(0x7f00000004c0)) 22:19:10 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x2000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x6000}, 0x14}}, 0x0) 22:19:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:19:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:19:10 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:19:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:19:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc020660b, &(0x7f00000004c0)) 22:19:10 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x8, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xf000}, 0x14}}, 0x0) 22:19:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x3000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc020662a, &(0x7f00000004c0)) 22:19:11 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x9, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x30000}, 0x14}}, 0x0) 22:19:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x4000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:11 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0xa, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc028660f, &(0x7f00000004c0)) 22:19:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:19:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:19:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x5000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x34000}, 0x14}}, 0x0) 22:19:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:19:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:19:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0xf, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:24 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:19:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0406618, &(0x7f00000004c0)) 22:19:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x6000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x80000}, 0x14}}, 0x0) 22:19:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0406619, &(0x7f00000004c0)) 22:19:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x7000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0xf0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x400300}, 0x14}}, 0x0) 22:19:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:19:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x300, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:19:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0506617, &(0x7f00000004c0)) 22:19:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:19:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x500, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xf0ffff}, 0x14}}, 0x0) 22:19:36 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x9000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:19:36 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:19:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x1000000}, 0x14}}, 0x0) 22:19:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc080661a, &(0x7f00000004c0)) 22:19:37 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x600, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:37 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf000000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:37 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x87ab8fb6, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x2000000}, 0x14}}, 0x0) 22:19:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:19:48 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x700, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:48 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x9effffff, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:48 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:19:48 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, 0x0) ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:19:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000480)={'U-', 0xbef8}, 0x16, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:19:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x3000000}, 0x14}}, 0x0) 22:19:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:19:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0c0583b, &(0x7f00000004c0)) 22:19:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xb68fab87, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x900, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:19:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x9000000}, 0x14}}, 0x0) 22:19:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x2) [ 1233.841347] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:19:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xf000000}, 0x14}}, 0x0) 22:19:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0xa00, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1233.916370] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:19:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xf0ffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1245.799679] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:20:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x3) 22:20:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, 0x0) ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:20:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xfffff000, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:01 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0xf00, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000480)={'U-', 0xbef8}, 0x16, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x2531a0c8}, 0x14}}, 0x0) 22:20:01 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x60000000}, 0x14}}, 0x0) [ 1245.864130] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xffffff7f, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, 0x0) ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:20:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x4) 22:20:01 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0xf000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x9effffff}, 0x14}}, 0x0) [ 1246.016703] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xc8a03125}, 0x14}}, 0x0) 22:20:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000480)={'U-', 0xbef8}, 0x16, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) [ 1246.077232] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xffffff9e, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xf0ffffff}, 0x14}}, 0x0) 22:20:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:20:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:20:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x30000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x8) [ 1258.095158] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xfcffffff}, 0x14}}, 0x0) 22:20:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x34000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xfffffff0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1258.168259] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0xffffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x9) 22:20:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:20:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xfffff000}, 0x14}}, 0x0) [ 1258.387627] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x80000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0xf, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1258.492447] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:20:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0xa) 22:20:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:20:25 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x14, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xffffff7f}, 0x14}}, 0x0) 22:20:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x400300, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 1270.360375] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:25 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0xf0ffff, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1270.428220] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xffffff9e}, 0x14}}, 0x0) 22:20:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-'}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0xd) [ 1270.596741] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted [ 1270.645688] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:37 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0xec0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:37 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x1000000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0xe) 22:20:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-'}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:20:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xfffffff0}, 0x14}}, 0x0) 22:20:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 1282.414790] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:37 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x2000000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xfffffffc}, 0x14}}, 0x0) 22:20:37 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x33fe0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10) 22:20:37 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x3000000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1282.659327] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0xffffffff}, 0x14}}, 0x0) 22:20:38 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x20000064, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1282.741887] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x4000000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:38 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-'}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x300) [ 1295.681131] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x5000000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:20:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:20:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:20:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 22:20:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x7ffff000, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1295.770489] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 22:20:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0xfffffdef, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x6000000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:20:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x808) 22:20:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x8, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1295.958843] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:20:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) [ 1296.042202] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 22:21:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:21:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x7000000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:21:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 22:21:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x900) 22:21:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:21:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:21:03 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0xc, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:21:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 22:21:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 1308.481190] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted [ 1308.501706] Failed to initialize the IGMP autojoin socket (err -2) 22:21:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x9000000, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) 22:21:03 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x24, r1, 0x500, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ')\'\\\x00'}]}, 0x24}}, 0x0) [ 1308.514694] Failed to initialize the IGMP autojoin socket (err -2) [ 1308.575769] Failed to initialize the IGMP autojoin socket (err -2) 22:21:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, 0x0, &(0x7f0000000480)={'U-', 0xbef8}, 0x16, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 1308.587621] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted [ 1308.636595] Failed to initialize the IGMP autojoin socket (err -2) 22:21:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0400000100ffff55aa5c7649631bffbb02be70dd447db92844ef8c5f6ca472674d1c8e0edc60b1fb673ab28289f358d8df370f1e1054e92b4609000000515b4ddf76554abd753c66cbe240d21e7b6584a71b69c4278206c9d71730ec3b1106a0d13cc1a4ea36a39eefed332b0e824c7f90774f5a199654ed2d3757d7673c13e2afff8ed0dc1f9484cc658d1cd5845643215e67753735e7ec58ca14a8942b98d019524f7cbcf9549edfe851b5aa033656cb23ccadbfdd8115263c41a285c98c3f524c9f68b1f96938f6eba7f921d4f712f54ed5d40c1b7675a48218b277c6715916ded2ec77690bb45ef6027d1d879a0617420be517a60e8ad77cfa4a483385fd10a8043847d417fa033ff85b375edb880ef3ce2c9e8f4aae21dd27eaff66d36bf31607698b32f24ae48b400a0f3048"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:21:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0xa00) 22:21:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001500)=""/102, 0x66, 0x4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) unshare(0x48020200) 22:21:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001800)) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000480)={'U-', 0xbef8}, 0x17, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f00000002c0)) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) [ 1311.533396] Failed to initialize the IGMP autojoin socket (err -2) [ 1312.144325] Failed to initialize the IGMP autojoin socket (err -2) [ 1312.168577] Failed to initialize the IGMP autojoin socket (err -2) [ 1312.187970] Failed to initialize the IGMP autojoin socket (err -2) [ 1312.315439] Failed to initialize the IGMP autojoin socket (err -2) [ 1312.509939] Failed to initialize the IGMP autojoin socket (err -2) [ 1312.560241] Failed to initialize the IGMP autojoin socket (err -2) [ 1312.573268] Failed to initialize the IGMP autojoin socket (err -2) [ 1313.403928] Bluetooth: hci0: command 0x0409 tx timeout [ 1315.349389] Failed to initialize the IGMP autojoin socket (err -2) [ 1315.452872] Bluetooth: hci0: command 0x041b tx timeout [ 1315.960360] Failed to initialize the IGMP autojoin socket (err -2) [ 1316.045614] Failed to initialize the IGMP autojoin socket (err -2) [ 1316.172023] Failed to initialize the IGMP autojoin socket (err -2) [ 1316.206360] Failed to initialize the IGMP autojoin socket (err -2) [ 1316.211237] Failed to initialize the IGMP autojoin socket (err -2) [ 1316.253053] Failed to initialize the IGMP autojoin socket (err -2) [ 1317.499885] Bluetooth: hci0: command 0x040f tx timeout [ 1318.159421] Failed to initialize the IGMP autojoin socket (err -2) [ 1318.677672] Failed to initialize the IGMP autojoin socket (err -2) [ 1319.074692] Failed to initialize the IGMP autojoin socket (err -2) [ 1319.450288] Failed to initialize the IGMP autojoin socket (err -2) [ 1319.541527] Failed to initialize the IGMP autojoin socket (err -2) [ 1319.598596] Failed to initialize the IGMP autojoin socket (err -2) [ 1319.616725] Failed to initialize the IGMP autojoin socket (err -2) [ 1320.572863] Bluetooth: hci1: command 0x0409 tx timeout [ 1320.984698] Failed to initialize the IGMP autojoin socket (err -2) [ 1321.320465] Failed to initialize the IGMP autojoin socket (err -2) [ 1322.106994] Failed to initialize the IGMP autojoin socket (err -2) [ 1322.480337] Failed to initialize the IGMP autojoin socket (err -2) [ 1322.566897] Failed to initialize the IGMP autojoin socket (err -2) [ 1322.619869] Bluetooth: hci1: command 0x041b tx timeout [ 1322.789223] Failed to initialize the IGMP autojoin socket (err -2) [ 1322.798117] Failed to initialize the IGMP autojoin socket (err -2) [ 1324.343175] Failed to initialize the IGMP autojoin socket (err -2) [ 1324.409301] Failed to initialize the IGMP autojoin socket (err -2) [ 1324.667950] Bluetooth: hci1: command 0x040f tx timeout [ 1324.912527] Failed to initialize the IGMP autojoin socket (err -2) [ 1325.463397] Failed to initialize the IGMP autojoin socket (err -2) [ 1325.931842] Failed to initialize the IGMP autojoin socket (err -2) [ 1326.062549] Failed to initialize the IGMP autojoin socket (err -2) [ 1326.212227] Failed to initialize the IGMP autojoin socket (err -2) [ 1326.848766] Bluetooth: hci3: command 0x0409 tx timeout [ 1327.704807] Failed to initialize the IGMP autojoin socket (err -2) [ 1328.044863] Failed to initialize the IGMP autojoin socket (err -2) [ 1328.118777] Failed to initialize the IGMP autojoin socket (err -2) [ 1328.462950] Failed to initialize the IGMP autojoin socket (err -2) [ 1328.841881] Failed to initialize the IGMP autojoin socket (err -2) [ 1328.878073] Failed to initialize the IGMP autojoin socket (err -2) [ 1328.891851] Bluetooth: hci3: command 0x041b tx timeout [ 1329.067342] Failed to initialize the IGMP autojoin socket (err -2) [ 1330.538790] Failed to initialize the IGMP autojoin socket (err -2) [ 1330.834174] Failed to initialize the IGMP autojoin socket (err -2) [ 1330.848694] Failed to initialize the IGMP autojoin socket (err -2) [ 1331.060588] Failed to initialize the IGMP autojoin socket (err -2) [ 1331.565381] Failed to initialize the IGMP autojoin socket (err -2) [ 1331.879957] Failed to initialize the IGMP autojoin socket (err -2) [ 1331.994207] Failed to initialize the IGMP autojoin socket (err -2) [ 1332.475908] Bluetooth: hci0: command 0x0409 tx timeout [ 1332.698565] Failed to initialize the IGMP autojoin socket (err -2) [ 1333.606440] Failed to initialize the IGMP autojoin socket (err -2) [ 1333.949274] Failed to initialize the IGMP autojoin socket (err -2) [ 1333.993176] Failed to initialize the IGMP autojoin socket (err -2) [ 1334.450334] Failed to initialize the IGMP autojoin socket (err -2) [ 1334.524020] Bluetooth: hci0: command 0x041b tx timeout [ 1334.727488] Failed to initialize the IGMP autojoin socket (err -2) [ 1334.922660] Failed to initialize the IGMP autojoin socket (err -2) [ 1335.680954] Failed to initialize the IGMP autojoin socket (err -2) [ 1336.577568] Bluetooth: hci0: command 0x040f tx timeout [ 1336.750805] Failed to initialize the IGMP autojoin socket (err -2) [ 1337.315799] Failed to initialize the IGMP autojoin socket (err -2) [ 1337.466165] Failed to initialize the IGMP autojoin socket (err -2) [ 1337.634860] Failed to initialize the IGMP autojoin socket (err -2) [ 1337.640377] Failed to initialize the IGMP autojoin socket (err -2) [ 1337.898180] Failed to initialize the IGMP autojoin socket (err -2) [ 1338.328693] Failed to initialize the IGMP autojoin socket (err -2) [ 1339.197961] Bluetooth: hci0: command 0x0409 tx timeout [ 1339.355360] Failed to initialize the IGMP autojoin socket (err -2) [ 1339.731439] Failed to initialize the IGMP autojoin socket (err -2) [ 1340.129121] Failed to initialize the IGMP autojoin socket (err -2) [ 1340.290467] Failed to initialize the IGMP autojoin socket (err -2) [ 1340.500836] Failed to initialize the IGMP autojoin socket (err -2) [ 1340.502572] Failed to initialize the IGMP autojoin socket (err -2) [ 1340.918277] Failed to initialize the IGMP autojoin socket (err -2) [ 1341.243854] Bluetooth: hci0: command 0x041b tx timeout [ 1341.848502] Failed to initialize the IGMP autojoin socket (err -2) [ 1342.334710] Failed to initialize the IGMP autojoin socket (err -2) [ 1342.903573] Failed to initialize the IGMP autojoin socket (err -2) 2024/06/23 22:21:38 executor 7 failed 11 times: executor 7: exit status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 16: Device or resource busy) loop exited with status 67 [ 1343.560159] Failed to initialize the IGMP autojoin socket (err -2) [ 1343.586369] Failed to initialize the IGMP autojoin socket (err -2) [ 1343.588739] Failed to initialize the IGMP autojoin socket (err -2) [ 1343.722001] Failed to initialize the IGMP autojoin socket (err -2) [ 1345.212889] Bluetooth: hci3: command 0x0409 tx timeout [ 1347.260898] Bluetooth: hci3: command 0x041b tx timeout [ 1349.308894] Bluetooth: hci3: command 0x040f tx timeout VM DIAGNOSIS: 22:21:38 Registers: info registers vcpu 0 RAX=fffff940000ac720 RBX=fffff940000ac721 RCX=ffffffff81571815 RDX=fffff940000ac721 RSI=0000000000000008 RDI=ffffea0000563900 RBP=fffff940000ac720 RSP=ffff8880441176f8 R8 =0000000000000001 R9 =ffffea0000563907 R10=fffff940000ac720 R11=0000000000000001 R12=dead000000000100 R13=0000000000000000 R14=dead000000000100 R15=00007f1f3b2a5000 RIP=ffffffff816c8e05 RFL=00000286 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f22f95856f4 CR3=000000003d8e4000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=2c2c2c2c2c2c2c2c2c2c2c2c2c2c2c2c XMM01=000000ff000000000000000000000000 XMM02=000000ff000000000000000000000000 XMM03=0000000000ff0000000000ff0000ff00 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=0000000066789ff2000000001560f5ba XMM06=0000000066789ff2000000001560f5ba XMM07=00000000000000000000000000000000 XMM08=65784500657250747261745363657845 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200020000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=1ffffd4000260820 RBX=0000000000000000 RCX=ffffffff815fe2a5 RDX=fffff94000260821 RSI=0000000000000000 RDI=0000000000000000 RBP=ffffea0001304100 RSP=ffff88803d187758 R8 =0000000000000000 R9 =ffffea0001304107 R10=fffff94000260820 R11=0000000000000001 R12=ffffea0001304108 R13=ffff88804bd8bce0 R14=dffffc0000000000 R15=00007f716819d000 RIP=ffffffff81409934 RFL=00000256 [---ZAP-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f8d10810b10 CR3=000000000d9ee000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=636578650a3a73656d69742031312064 XMM02=6174732074697865203a3720726f7475 XMM03=203a4c4941465a59530a373620737574 XMM04=45534e5554286c74636f69203a6e7574 XMM05=6528200a64656c696166202946464954 XMM06=20656369766544203a3631206f6e7272 XMM07=7973756220656372756f73657220726f XMM08=2074697865203a3720726f7475636578 XMM09=4941465a59530a373620737574617473 XMM10=5554286c74636f69203a6e7574203a4c XMM11=0a64656c69616620294646495445534e XMM12=69766544203a3631206f6e7272652820 XMM13=6220656372756f73657220726f206563 XMM14=64657469786520706f6f6c0a29797375 XMM15=0a373620737574617473206874697720