0ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1767.240198] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (8 blocks) 12:39:12 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1767.279584] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1767.282312] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1767.285898] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1767.289645] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1767.309767] EXT4-fs (loop2): unsupported inode size: 0 [ 1767.311247] EXT4-fs (loop2): blocksize: 2048 [ 1767.321625] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1767.358828] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 1767.401142] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:39:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x9, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:39:12 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0xffffff8c, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:39:12 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:12 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:12 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:12 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519", 0x80, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:12 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:12 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:12 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1767.691832] EXT4-fs (loop2): unsupported inode size: 0 [ 1767.693313] EXT4-fs (loop2): blocksize: 2048 [ 1767.766675] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1767.817632] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 1767.822840] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1767.826521] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1767.853657] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1767.857684] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1783.365046] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 12:39:36 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xf, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:39:36 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:36 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:36 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:36 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df392", 0x89, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1791.156152] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1791.265164] EXT4-fs (loop2): unsupported inode size: 0 [ 1791.266705] EXT4-fs (loop2): blocksize: 2048 [ 1791.303166] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1791.304706] EXT4-fs (loop4): group descriptors corrupted! 12:39:36 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:36 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1791.335300] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1791.337333] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1791.345079] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:39:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xf0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 1791.368717] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 1791.406750] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:39:36 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 12:39:36 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1791.513788] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1791.636413] EXT4-fs error (device loop3): ext4_fill_super:4973: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1791.655318] EXT4-fs (loop3): get root inode failed [ 1791.657393] EXT4-fs (loop3): mount failed 12:39:50 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:50 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df392", 0x89, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:50 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x300, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:39:50 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:50 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:50 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:50 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:50 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 12:39:50 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:50 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1805.534639] EXT4-fs error (device loop3): ext4_fill_super:4973: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1805.581331] EXT4-fs (loop3): get root inode failed [ 1805.582794] EXT4-fs (loop3): mount failed [ 1805.591604] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1805.616704] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 1805.622761] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1805.626303] EXT4-fs: failed to create workqueue [ 1805.627513] EXT4-fs (loop1): mount failed [ 1805.634802] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1805.636393] EXT4-fs (loop4): group descriptors corrupted! [ 1805.738467] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:39:50 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df392", 0x89, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:50 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:50 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x480, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:39:50 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x0, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:51 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:51 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:51 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x0, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:51 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:51 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:39:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x500, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 1805.983368] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 12:39:51 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 12:39:51 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x0, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1806.017715] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:39:51 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1806.036218] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:39:51 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x0, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:39:51 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1806.217657] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 1806.226812] EXT4-fs (loop3): mount failed [ 1806.361819] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1806.391823] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:40:05 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:05 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:05 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:05 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x600, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:40:05 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:05 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1820.535177] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1820.537676] EXT4-fs (loop6): get root inode failed [ 1820.538570] EXT4-fs (loop6): mount failed 12:40:05 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b2743", 0x8e, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1820.560819] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:40:05 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x0, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1820.577764] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1820.582283] EXT4-fs (loop4): get root inode failed [ 1820.583678] EXT4-fs (loop4): mount failed 12:40:05 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x700, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 1820.680987] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 1820.682717] EXT4-fs (loop3): mount failed [ 1820.757790] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1820.758476] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 1820.762142] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1820.778465] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:40:20 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:20 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b2743", 0x8e, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x900, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:40:20 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:20 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b2743", 0x8e, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:20 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r0, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:20 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:20 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1835.314420] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 1835.318129] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:40:20 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1835.425164] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 1835.431361] EXT4-fs (loop3): mount failed 12:40:20 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b2743", 0x8e, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1835.476384] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1835.485735] EXT4-fs (loop4): get root inode failed [ 1835.487303] EXT4-fs (loop4): mount failed [ 1835.534632] EXT4-fs error (device loop6): ext4_orphan_get:1413: comm syz-executor.6: bad orphan inode 301979167 [ 1835.540320] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1835.619667] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1835.634821] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:40:33 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r0, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:33 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:33 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:33 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xf00, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:40:33 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6", 0x90, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:33 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:33 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1848.630766] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 12:40:33 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1848.647694] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1848.719252] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1848.752109] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1848.761500] EXT4-fs (loop4): get root inode failed [ 1848.763253] EXT4-fs (loop4): mount failed [ 1848.779356] EXT4-fs (loop6): get root inode failed [ 1848.780720] EXT4-fs (loop6): mount failed [ 1848.783327] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 12:40:33 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1848.822175] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1848.842721] EXT4-fs error (device loop3): ext4_orphan_get:1413: comm syz-executor.3: bad orphan inode 301979167 [ 1848.853623] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:40:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x8004, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:40:34 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:40:34 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r0, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:34 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6", 0x90, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1848.980314] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 12:40:34 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:34 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1848.999897] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:40:34 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:34 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:34 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xf000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 1849.181432] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1849.186732] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1849.194856] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1849.199285] EXT4-fs (loop4): get root inode failed [ 1849.200625] EXT4-fs (loop4): mount failed [ 1849.250895] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated 12:40:34 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1849.286322] EXT4-fs (loop6): get root inode failed [ 1849.287740] EXT4-fs (loop6): mount failed 12:40:34 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1849.332722] EXT4-fs: failed to create workqueue [ 1849.333887] EXT4-fs (loop3): mount failed [ 1849.424832] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 1849.449809] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1849.560574] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1849.573718] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:40:48 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:48 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:40:48 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:48 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:48 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:48 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6", 0x90, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x80000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:40:48 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1863.028720] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1863.031589] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1863.040317] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1863.049337] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 1863.053848] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1863.055302] EXT4-fs (loop4): get root inode failed [ 1863.056746] EXT4-fs (loop4): mount failed [ 1863.069283] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 1863.072145] EXT4-fs (loop6): get root inode failed [ 1863.073347] EXT4-fs (loop6): mount failed 12:40:48 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1863.202547] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 12:40:48 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:40:48 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1863.231167] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:40:48 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1863.290800] EXT4-fs error (device loop3): ext4_orphan_get:1413: comm syz-executor.3: bad orphan inode 301979167 12:40:48 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(0x0, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 1863.318253] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1863.413131] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1863.424606] EXT4-fs (loop4): get root inode failed [ 1863.426273] EXT4-fs (loop4): mount failed [ 1863.457472] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 1863.476171] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:41:01 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:01 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:01 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:01 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:01 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xf0ffff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:41:01 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:01 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1876.214299] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 12:41:01 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1876.224244] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1876.224839] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1876.232773] EXT4-fs error (device loop3): ext4_orphan_get:1413: comm syz-executor.3: bad orphan inode 301979167 [ 1876.242394] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1876.250159] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:41:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x1000000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:41:01 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1876.290369] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 1876.305231] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1876.336480] EXT4-fs error (device loop6): ext4_orphan_get:1413: comm syz-executor.6: bad orphan inode 301979167 12:41:01 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x0, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:01 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:01 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1876.382331] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:41:01 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:01 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1876.480240] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 1876.483435] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1876.488724] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1876.500054] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:41:01 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:01 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x0, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1876.635499] EXT4-fs error (device loop3): ext4_orphan_get:1413: comm syz-executor.3: bad orphan inode 301979167 [ 1876.637673] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:41:15 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x2000000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:41:15 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:15 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:15 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:15 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:15 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:15 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x0, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1890.268316] EXT4-fs error (device loop6): ext4_orphan_get:1413: comm syz-executor.6: bad orphan inode 301979167 [ 1890.284796] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1890.306718] EXT4-fs error (device loop3): ext4_orphan_get:1413: comm syz-executor.3: bad orphan inode 301979167 [ 1890.314595] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1890.331782] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1890.367733] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1890.369830] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1890.425817] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1890.452305] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1890.518825] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1890.522183] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:41:27 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x0, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:27 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x3000000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 1902.291379] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1902.293132] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1902.338191] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1902.340964] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1902.361268] EXT4-fs error (device loop3): ext4_orphan_get:1413: comm syz-executor.3: bad orphan inode 301979167 [ 1902.387757] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1902.413198] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1902.429766] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1902.445749] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:41:27 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1902.526456] EXT4-fs error (device loop6): ext4_orphan_get:1413: comm syz-executor.6: bad orphan inode 301979167 [ 1902.553260] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 12:41:27 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x4000000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:41:27 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:27 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x0, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 6: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x0, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1902.753684] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1902.758907] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1902.811161] EXT4-fs error (device loop6): ext4_orphan_get:1413: comm syz-executor.6: bad orphan inode 301979167 [ 1902.814468] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1902.844464] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1902.937218] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1902.949745] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:41:40 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x0, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:40 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:40 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 1) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:41 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:41 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:41 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x5000000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:41:41 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 1) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 1915.828522] FAULT_INJECTION: forcing a failure. [ 1915.828522] name failslab, interval 1, probability 0, space 0, times 0 [ 1915.831265] CPU: 1 PID: 97974 Comm: syz-executor.3 Not tainted 5.10.156 #1 [ 1915.832705] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1915.834442] Call Trace: [ 1915.835005] dump_stack+0x107/0x167 [ 1915.835795] should_fail.cold+0x5/0xa [ 1915.836586] ? __do_sys_memfd_create+0xfb/0x450 [ 1915.837562] should_failslab+0x5/0x20 [ 1915.838358] __kmalloc+0x72/0x3f0 [ 1915.839089] __do_sys_memfd_create+0xfb/0x450 [ 1915.840031] ? ksys_write+0x1a9/0x260 [ 1915.840835] ? memfd_file_seals_ptr+0x170/0x170 [ 1915.841805] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1915.842890] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1915.843987] do_syscall_64+0x33/0x40 [ 1915.844777] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1915.845856] RIP: 0033:0x7ff82791fb19 [ 1915.846615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1915.850458] RSP: 002b:00007ff824e94f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1915.852053] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ff82791fb19 [ 1915.853535] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ff8279790fb [ 1915.855036] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 1915.856565] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 1915.858062] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 1915.920555] FAULT_INJECTION: forcing a failure. [ 1915.920555] name failslab, interval 1, probability 0, space 0, times 0 [ 1915.923362] CPU: 1 PID: 97994 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 1915.924806] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1915.926518] Call Trace: [ 1915.927078] dump_stack+0x107/0x167 [ 1915.927874] should_fail.cold+0x5/0xa [ 1915.928669] ? copy_process+0x4386/0x66f0 [ 1915.929548] should_failslab+0x5/0x20 [ 1915.930349] kmem_cache_alloc_node+0x55/0x370 [ 1915.931301] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1915.932388] copy_process+0x4386/0x66f0 [ 1915.933226] ? lock_downgrade+0x6d0/0x6d0 [ 1915.934107] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1915.935217] ? __cleanup_sighand+0xb0/0xb0 [ 1915.936112] ? find_held_lock+0x2c/0x110 [ 1915.936962] kernel_clone+0xe7/0xa20 [ 1915.937738] ? lock_downgrade+0x6d0/0x6d0 [ 1915.938603] ? find_held_lock+0x2c/0x110 [ 1915.939460] ? copy_init_mm+0x20/0x20 [ 1915.940255] ? ksys_write+0x12d/0x260 [ 1915.941049] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1915.942075] __do_sys_fork+0x8a/0xc0 [ 1915.942875] ? kernel_clone+0xa20/0xa20 [ 1915.943735] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1915.944843] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1915.944871] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1915.945903] ? trace_hardirqs_on+0x5b/0x180 [ 1915.945926] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1915.945943] do_syscall_64+0x33/0x40 [ 1915.945962] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1915.945985] RIP: 0033:0x7fcf2397bb19 [ 1915.951757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1915.955603] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1915.957181] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 1915.958665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1915.960161] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1915.961630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1915.963110] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 [ 1915.988539] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1915.992578] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1916.003958] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1916.012384] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:41:41 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x0, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:41 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x6000000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:41:41 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) (fail_nth: 1) 12:41:41 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:41 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:41 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 2) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:41:41 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1916.222031] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1916.234860] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1916.317271] FAULT_INJECTION: forcing a failure. [ 1916.317271] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.319608] CPU: 1 PID: 98476 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 1916.320805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1916.322250] Call Trace: [ 1916.322743] dump_stack+0x107/0x167 [ 1916.323431] should_fail.cold+0x5/0xa [ 1916.324133] ? create_object.isra.0+0x3a/0xa20 [ 1916.324944] should_failslab+0x5/0x20 [ 1916.325625] kmem_cache_alloc+0x5b/0x360 [ 1916.326355] create_object.isra.0+0x3a/0xa20 [ 1916.327125] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1916.328035] kmem_cache_alloc_node+0x169/0x370 [ 1916.328843] copy_process+0x4386/0x66f0 [ 1916.329561] ? lock_downgrade+0x6d0/0x6d0 [ 1916.330323] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1916.331293] ? __cleanup_sighand+0xb0/0xb0 [ 1916.332070] ? find_held_lock+0x2c/0x110 [ 1916.332795] kernel_clone+0xe7/0xa20 [ 1916.333447] ? lock_downgrade+0x6d0/0x6d0 [ 1916.334189] ? find_held_lock+0x2c/0x110 [ 1916.334923] ? copy_init_mm+0x20/0x20 [ 1916.335632] ? ksys_write+0x12d/0x260 [ 1916.336319] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1916.337174] __do_sys_fork+0x8a/0xc0 [ 1916.337844] ? kernel_clone+0xa20/0xa20 [ 1916.338564] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1916.339508] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.340443] ? trace_hardirqs_on+0x5b/0x180 [ 1916.341205] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.342142] do_syscall_64+0x33/0x40 [ 1916.342796] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1916.343725] RIP: 0033:0x7fcf2397bb19 [ 1916.344408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.347674] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1916.349022] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 1916.350273] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1916.351561] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1916.352816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1916.354079] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 12:41:41 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:41 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x7000000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 1916.376678] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1916.407649] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1916.424060] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:41:41 executing program 4: getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000140)=0x80) bind$802154_raw(r0, &(0x7f0000000180)={0x24, @none={0x0, 0x1}}, 0x14) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32323330373039383000"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040000c00000000000000daf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000004300000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000daf4655fdaf4655fdaf4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011500)="ed41000000080000daf4655fdbf4655fdbf4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x2100}, {&(0x7f0000011600)="20000000641e8ebf641e8ebf00000000daf4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011700)="8081000000601020daf4655fdaf4655fdaf4655f00000000000001004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000daf4655f00"/160, 0xa0, 0x2600}, {&(0x7f0000011800)="c041000000380000daf4655fdaf4655fdaf4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000020000000", 0x40, 0x2a00}, {&(0x7f0000011900)="20000000000000000000000000000000daf4655f000000000000000000000000000002ea00"/64, 0x40, 0x2a80}, {&(0x7f0000011a00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000904a5ec200000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x2b00}, {&(0x7f0000011b00)="ed8100001a040000dbf4655fdbf4655fdbf4655f00000000000001004000000000000800010000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000046b58a6000000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000", 0xa0, 0x2c00}, {&(0x7f0000011c00)="ffa1000026000000dbf4655fdbf4655fdbf4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3232333037303938302f66696c65302f66696c65300000000000000000000000000000000000000000000029d1c2e100000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000", 0xa0, 0x2d00}, {&(0x7f0000011d00)="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", 0x1a0, 0x2e00}, {&(0x7f0000000480)="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", 0x178, 0x3000}, {&(0x7f0000012000)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000012100)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x10000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x10800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12800}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13000}, {&(0x7f0000012800)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033320075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x20000}, {&(0x7f0000012900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x28000}], 0x0, &(0x7f0000000040)={[{@prjquota}, {@jqfmt_vfsold}]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r1, 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) recvmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000680)=@alg, 0x80, &(0x7f0000000940)=[{&(0x7f0000000700)=""/211, 0xd3}, {&(0x7f0000000800)=""/98, 0x62}, {&(0x7f0000000880)=""/172, 0xac}], 0x3, &(0x7f0000000980)=""/245, 0xf5}, 0x9}], 0x1, 0x40010000, &(0x7f0000000ac0)={0x77359400}) getsockname(r1, &(0x7f0000000600)=@llc, &(0x7f00000001c0)=0x80) 12:41:41 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 3) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 1916.477853] FAULT_INJECTION: forcing a failure. [ 1916.477853] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1916.480793] CPU: 0 PID: 98665 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 1916.482183] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1916.483865] Call Trace: [ 1916.484405] dump_stack+0x107/0x167 [ 1916.485144] should_fail.cold+0x5/0xa [ 1916.485923] __alloc_pages_nodemask+0x182/0x680 [ 1916.486861] ? lock_downgrade+0x6d0/0x6d0 [ 1916.487729] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1916.488965] ? memcg_slab_post_alloc_hook+0x183/0x3f0 [ 1916.490013] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1916.490992] ? kmem_cache_alloc_node+0x2ca/0x370 [ 1916.491958] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1916.493016] copy_process+0x60a/0x66f0 [ 1916.493810] ? lock_downgrade+0x6d0/0x6d0 [ 1916.494654] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1916.495730] ? __cleanup_sighand+0xb0/0xb0 [ 1916.496590] ? find_held_lock+0x2c/0x110 [ 1916.497411] kernel_clone+0xe7/0xa20 [ 1916.498167] ? lock_downgrade+0x6d0/0x6d0 [ 1916.498998] ? find_held_lock+0x2c/0x110 [ 1916.499837] ? copy_init_mm+0x20/0x20 [ 1916.500608] ? ksys_write+0x12d/0x260 [ 1916.501395] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1916.502380] __do_sys_fork+0x8a/0xc0 [ 1916.503142] ? kernel_clone+0xa20/0xa20 [ 1916.503960] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1916.505013] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.505669] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1916.506049] ? trace_hardirqs_on+0x5b/0x180 [ 1916.506071] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.506089] do_syscall_64+0x33/0x40 [ 1916.506108] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1916.506121] RIP: 0033:0x7fcf2397bb19 [ 1916.506139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.506149] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1916.506169] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 1916.506180] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1916.506190] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1916.506201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1916.506212] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 [ 1916.528310] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:41:41 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) [ 1916.608169] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1928.922851] FAULT_INJECTION: forcing a failure. [ 1928.922851] name failslab, interval 1, probability 0, space 0, times 0 [ 1928.925240] CPU: 0 PID: 99055 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 1928.926415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1928.927839] Call Trace: [ 1928.928289] dump_stack+0x107/0x167 [ 1928.928909] should_fail.cold+0x5/0xa [ 1928.929552] ? prepare_creds+0x25/0x5f0 [ 1928.930225] should_failslab+0x5/0x20 [ 1928.930865] kmem_cache_alloc+0x5b/0x360 [ 1928.931562] ? lock_downgrade+0x6d0/0x6d0 [ 1928.932267] prepare_creds+0x25/0x5f0 [ 1928.932916] copy_creds+0x72/0x580 [ 1928.933525] copy_process+0xee8/0x66f0 [ 1928.934182] ? lock_downgrade+0x6d0/0x6d0 [ 1928.934891] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1928.935802] ? __cleanup_sighand+0xb0/0xb0 [ 1928.936537] ? find_held_lock+0x2c/0x110 [ 1928.937233] kernel_clone+0xe7/0xa20 [ 1928.937870] ? lock_downgrade+0x6d0/0x6d0 [ 1928.938571] ? find_held_lock+0x2c/0x110 [ 1928.939260] ? copy_init_mm+0x20/0x20 [ 1928.939936] ? ksys_write+0x12d/0x260 [ 1928.941236] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1928.942443] __do_sys_fork+0x8a/0xc0 [ 1928.943382] ? kernel_clone+0xa20/0xa20 [ 1928.944387] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1928.945704] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1928.946993] ? trace_hardirqs_on+0x5b/0x180 [ 1928.948077] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1928.949317] do_syscall_64+0x33/0x40 [ 1928.950219] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1928.951482] RIP: 0033:0x7fcf2397bb19 [ 1928.952290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.956089] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1928.957653] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 1928.959125] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1928.960741] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1928.962210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1928.963677] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 12:41:54 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:41:54 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:54 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 4) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:41:54 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3, 0x1f) r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) 12:41:54 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x3, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xfffffffffffffe01, 0x4, 0x0, 0x9, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) fstat(r0, &(0x7f00000001c0)) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:41:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x9000000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:41:54 executing program 4: write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x20, 0x0, 0xfb, 0x4, @tick=0x7, {0xf9}, {0x1, 0x1a}, @result={0x9, 0xdb}}], 0x1c) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x102, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}], ['\x00']}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0xa, 0x0, '\x00', [{0x3f, 0x0, 0x8, 0x100, 0x0, 0x9}, {0x10000, 0x81, 0x0, 0x8, 0xffffffff, 0x5}], ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000180)=0x4004, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x3, 0xff, 0x0, 0x9, 0x61808, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, 0x1, @perf_config_ext={0x3ff, 0x100000001}, 0x1002, 0x7, 0x9, 0x6, 0x6, 0x2, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0xd, r1, 0x0) open(&(0x7f00000001c0)='./file1\x00', 0x101402, 0x1141819f688a6e08) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="080002f60000003000000000"]) 12:41:54 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1929.048612] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1929.051181] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1929.069826] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1929.092666] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1929.096757] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1929.163781] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 12:41:54 executing program 0: r0 = fork() ptrace(0x10, r0) r1 = getpid() ioprio_get$pid(0x3, r1) r2 = getpid() ioprio_get$pid(0x3, r2) waitid(0x2, r2, 0x0, 0x1, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) 12:41:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xf000000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:42:08 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x2b101c9f, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:42:08 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 5) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:42:08 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:42:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:08 executing program 4: write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x20, 0x0, 0xfb, 0x4, @tick=0x7, {0xf9}, {0x1, 0x1a}, @result={0x9, 0xdb}}], 0x1c) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x102, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}], ['\x00']}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0xa, 0x0, '\x00', [{0x3f, 0x0, 0x8, 0x100, 0x0, 0x9}, {0x10000, 0x81, 0x0, 0x8, 0xffffffff, 0x5}], ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000180)=0x4004, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x3, 0xff, 0x0, 0x9, 0x61808, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, 0x1, @perf_config_ext={0x3ff, 0x100000001}, 0x1002, 0x7, 0x9, 0x6, 0x6, 0x2, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0xd, r1, 0x0) open(&(0x7f00000001c0)='./file1\x00', 0x101402, 0x1141819f688a6e08) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="080002f60000003000000000"]) 12:42:08 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:08 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5e, 0x10100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0x1}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0xa, 0x12, 0x4, 0x40008f6, 0x5, 0x15b, 0xffffffffffffffff}) fork() r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r1, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r1, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x7fff}) r2 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x8034, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r2, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) r3 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r3) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000008, r3) 12:42:08 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) ptrace$cont(0x9, r0, 0x80000000, 0x4) [ 1943.189276] FAULT_INJECTION: forcing a failure. [ 1943.189276] name failslab, interval 1, probability 0, space 0, times 0 [ 1943.192197] CPU: 0 PID: 99803 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 1943.193330] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1943.193622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1943.193633] Call Trace: [ 1943.197175] dump_stack+0x107/0x167 [ 1943.197955] should_fail.cold+0x5/0xa [ 1943.198745] ? create_object.isra.0+0x3a/0xa20 [ 1943.199716] should_failslab+0x5/0x20 [ 1943.200511] kmem_cache_alloc+0x5b/0x360 [ 1943.201360] create_object.isra.0+0x3a/0xa20 [ 1943.202294] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1943.203362] kmem_cache_alloc+0x159/0x360 [ 1943.204244] prepare_creds+0x25/0x5f0 [ 1943.205047] copy_creds+0x72/0x580 [ 1943.205805] copy_process+0xee8/0x66f0 [ 1943.206620] ? lock_downgrade+0x6d0/0x6d0 [ 1943.207500] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1943.208593] ? __cleanup_sighand+0xb0/0xb0 [ 1943.209496] ? find_held_lock+0x2c/0x110 [ 1943.210351] kernel_clone+0xe7/0xa20 [ 1943.211126] ? lock_downgrade+0x6d0/0x6d0 [ 1943.211988] ? find_held_lock+0x2c/0x110 [ 1943.212821] ? copy_init_mm+0x20/0x20 [ 1943.213614] ? ksys_write+0x12d/0x260 [ 1943.214409] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1943.215416] __do_sys_fork+0x8a/0xc0 [ 1943.216201] ? kernel_clone+0xa20/0xa20 [ 1943.217044] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1943.218123] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1943.219189] ? trace_hardirqs_on+0x5b/0x180 [ 1943.220103] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1943.221162] do_syscall_64+0x33/0x40 [ 1943.221929] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1943.222978] RIP: 0033:0x7fcf2397bb19 [ 1943.223756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1943.227515] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1943.229070] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 1943.230534] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1943.232026] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1943.233508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1943.234956] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 [ 1943.239341] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1943.245930] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1943.263469] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1943.269088] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:42:08 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x80040000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:42:08 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_80211_inject_frame(&(0x7f0000000280)=@broadcast, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r1, 0x9) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) write(r2, &(0x7f0000000040)="3c0086a147cda839e9caf8ef32894ea048c2d12700aa975ee262ea2b70b2544be4903fb48cbbb8159f5477839f29e8a70b1f8e563201fbb01c0d2f3f7d25c60bb7006238bc7480c848d5f01b5ebcdc25e94fcfb3c3ad6f68b8862075288f472f3aa64f6e39a6f87b51faed0fe2a7bf5761be500922df74599aae8cfc5e870e1797592273a7d8ba5fc56921eef3c686c4ef38c2d0422bf3d519fd9e33f270217801131e8861f133894f64c4ab6b414b330a28eb976c2c9c65fdc7ec3b98f31f074e3822dd3e1cfd2bda38", 0xca) [ 1943.302700] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 12:42:08 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f00000006c0)={0x1e0, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xbc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'ib', 0x3a, 'veth1_macvtap\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1e5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}]}, @TIPC_NLA_MEDIA={0x98, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x93e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xaad}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9c7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x800}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xd5f4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xdda8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x8000}, 0x40) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) dup3(0xffffffffffffffff, r0, 0x80000) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x5, 0x8, 0x8, 0x3f, 0x0, 0x5, 0x220, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x9}, 0x8040, 0x5533, 0x7, 0x1, 0x9, 0x80000000, 0xf28f, 0x0, 0x4, 0x0, 0x3}, 0x0, 0xb, r3, 0x1) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) copy_file_range(r1, &(0x7f0000000300)=0x3a4, 0xffffffffffffffff, &(0x7f0000000380)=0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:08 executing program 0: r0 = fork() ptrace(0x4207, r0) r1 = getpid() ioprio_get$pid(0x3, r1) waitid(0x0, r1, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) 12:42:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:08 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:42:08 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:08 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x8cffffff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 1943.487534] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1943.501968] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1943.510808] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 12:42:08 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 6) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:42:08 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1943.571432] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:42:08 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xa) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={'\x00', 0x2, 0x7ff, 0x94, 0xf487, 0x10001, r0}) 12:42:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1943.637270] FAULT_INJECTION: forcing a failure. [ 1943.637270] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1943.638668] CPU: 1 PID: 100642 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 1943.639443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1943.640361] Call Trace: [ 1943.640683] dump_stack+0x107/0x167 [ 1943.641086] should_fail.cold+0x5/0xa [ 1943.641520] __alloc_pages_nodemask+0x182/0x680 [ 1943.642025] ? lock_downgrade+0x6d0/0x6d0 [ 1943.642492] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1943.643152] ? memcg_slab_post_alloc_hook+0x183/0x3f0 [ 1943.643734] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1943.644250] ? kmem_cache_alloc_node+0x2ca/0x370 [ 1943.644765] copy_process+0x60a/0x66f0 [ 1943.645201] ? lock_downgrade+0x6d0/0x6d0 [ 1943.645657] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1943.646227] ? __cleanup_sighand+0xb0/0xb0 [ 1943.646693] ? find_held_lock+0x2c/0x110 [ 1943.647150] kernel_clone+0xe7/0xa20 [ 1943.647583] ? lock_downgrade+0x6d0/0x6d0 [ 1943.648042] ? find_held_lock+0x2c/0x110 [ 1943.648495] ? copy_init_mm+0x20/0x20 [ 1943.648924] ? ksys_write+0x12d/0x260 [ 1943.649362] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1943.649924] __do_sys_fork+0x8a/0xc0 [ 1943.650344] ? kernel_clone+0xa20/0xa20 [ 1943.650804] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1943.651394] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1943.651990] ? trace_hardirqs_on+0x5b/0x180 [ 1943.652476] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1943.653049] do_syscall_64+0x33/0x40 [ 1943.653468] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1943.654044] RIP: 0033:0x7fcf2397bb19 [ 1943.654470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1943.656530] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1943.657391] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 1943.658193] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1943.658993] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1943.659795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1943.660612] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 [ 1943.663384] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1943.682933] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1943.692646] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1943.762298] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 12:42:22 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) gettid() 12:42:22 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 7) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:42:22 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="05"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:22 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:22 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:42:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="b9d54400465ba277cbbfd3def7e6ce26c0ca5479ce13a8bec30189ec9013fac20ffb0f30e0d526d0eb4fbe203a133911e8c2de6a184a7315", @ANYRES16=r1, @ANYBLOB="050000000000000000002e00000008000300", @ANYRES32=r2, @ANYBLOB="0a00340002020202020200000a00060008021100000000000800350000000000080026006c090000"], 0x44}}, 0x0) 12:42:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x9effffff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:42:22 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1957.658520] FAULT_INJECTION: forcing a failure. [ 1957.658520] name failslab, interval 1, probability 0, space 0, times 0 [ 1957.661564] CPU: 1 PID: 100893 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 1957.663189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1957.665121] Call Trace: [ 1957.665744] dump_stack+0x107/0x167 [ 1957.666593] should_fail.cold+0x5/0xa [ 1957.667477] ? create_object.isra.0+0x3a/0xa20 [ 1957.668565] should_failslab+0x5/0x20 [ 1957.669447] kmem_cache_alloc+0x5b/0x360 [ 1957.670393] create_object.isra.0+0x3a/0xa20 [ 1957.671409] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1957.672588] __kmalloc+0x16e/0x3f0 [ 1957.673419] security_prepare_creds+0x112/0x190 [ 1957.674499] prepare_creds+0x458/0x5f0 [ 1957.675401] copy_creds+0x72/0x580 [ 1957.676232] copy_process+0xee8/0x66f0 [ 1957.677141] ? lock_downgrade+0x6d0/0x6d0 [ 1957.678105] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1957.679320] ? __cleanup_sighand+0xb0/0xb0 [ 1957.680327] ? find_held_lock+0x2c/0x110 [ 1957.681274] kernel_clone+0xe7/0xa20 [ 1957.682136] ? lock_downgrade+0x6d0/0x6d0 [ 1957.683122] ? find_held_lock+0x2c/0x110 [ 1957.684103] ? copy_init_mm+0x20/0x20 [ 1957.685021] ? ksys_write+0x12d/0x260 [ 1957.685944] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1957.687107] __do_sys_fork+0x8a/0xc0 [ 1957.688017] ? kernel_clone+0xa20/0xa20 [ 1957.688986] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1957.690243] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1957.691472] ? trace_hardirqs_on+0x5b/0x180 [ 1957.692508] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1957.693724] do_syscall_64+0x33/0x40 [ 1957.694609] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1957.695835] RIP: 0033:0x7fcf2397bb19 [ 1957.696719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1957.701082] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1957.702896] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 1957.704591] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1957.706275] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1957.707967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1957.709668] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 12:42:22 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1957.765261] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1957.820642] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1957.827137] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:42:23 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:42:23 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) r1 = getpid() ioprio_get$pid(0x3, r1) wait4(r1, 0x0, 0x1, &(0x7f00000000c0)) 12:42:23 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1957.927238] EXT4-fs (loop3): Unrecognized mount option "" or missing value 12:42:23 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1957.997284] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1958.020563] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1958.093487] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1958.126853] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1958.143439] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:42:44 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) openat(r2, &(0x7f0000000140)='./file1\x00', 0x4040, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000003c0)={@local, @multicast, @void, {@ipv4={0x800, @udp={{0xa, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x33, 0x0, @private=0xa010102, @remote, {[@timestamp_addr={0x44, 0x14, 0x6, 0x1, 0x0, [{@empty}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}}, {0x0, 0x0, 0x8}}}}}, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x20881, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000080)={0x30, 0x39, 0xe, 0xa, 0x0, 0x80, 0x3, 0x80}) dup(0xffffffffffffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) 12:42:44 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:42:44 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:44 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:44 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 8) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:42:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r0, 0x0, 0xee01) tee(r1, r2, 0x4, 0x5) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xbd}}, './file0/file0\x00'}) r4 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r3, 0x80089419, &(0x7f00000002c0)) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r4, 0x80489439, &(0x7f0000000000)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)={{0x0, 0x80, 0x2, 0x7, 0x0, 0x80000000, 0x3, 0x1, 0x4, 0xffff, 0x0, 0x9, 0xda8a, 0x5, 0x7}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = fork() ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x200}}, './file0/file0\x00'}) readlinkat(r6, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=""/30, 0x1e) ptrace(0x10, r5) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r5, 0x7, 0x7) 12:42:44 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:44 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x9f1c102b, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 1979.188820] FAULT_INJECTION: forcing a failure. [ 1979.188820] name failslab, interval 1, probability 0, space 0, times 0 [ 1979.190194] CPU: 0 PID: 101578 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 1979.190948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1979.191842] Call Trace: [ 1979.192140] dump_stack+0x107/0x167 [ 1979.192529] should_fail.cold+0x5/0xa [ 1979.192945] ? security_prepare_creds+0x112/0x190 [ 1979.193462] should_failslab+0x5/0x20 [ 1979.193876] __kmalloc+0x72/0x3f0 [ 1979.194253] security_prepare_creds+0x112/0x190 [ 1979.194764] prepare_creds+0x458/0x5f0 [ 1979.195181] copy_creds+0x72/0x580 [ 1979.195568] copy_process+0xee8/0x66f0 [ 1979.196007] ? lock_downgrade+0x6d0/0x6d0 [ 1979.196454] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1979.197023] ? __cleanup_sighand+0xb0/0xb0 [ 1979.197480] ? find_held_lock+0x2c/0x110 [ 1979.197939] kernel_clone+0xe7/0xa20 [ 1979.198353] ? lock_downgrade+0x6d0/0x6d0 [ 1979.198803] ? find_held_lock+0x2c/0x110 [ 1979.199246] ? copy_init_mm+0x20/0x20 [ 1979.199674] ? ksys_write+0x12d/0x260 [ 1979.200112] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1979.200648] __do_sys_fork+0x8a/0xc0 [ 1979.201060] ? kernel_clone+0xa20/0xa20 [ 1979.201496] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1979.202070] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1979.202636] ? trace_hardirqs_on+0x5b/0x180 [ 1979.203111] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1979.203685] do_syscall_64+0x33/0x40 [ 1979.204128] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1979.204675] RIP: 0033:0x7fcf2397bb19 [ 1979.205084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1979.207057] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1979.207883] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 1979.208666] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1979.209425] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1979.210183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1979.210939] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 12:42:44 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1979.254176] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1979.261237] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1979.264182] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 1979.273486] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:42:44 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xeaffffff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:42:44 executing program 0: r0 = fork() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) waitid(0x0, r1, 0x0, 0x4, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000440)="cbe30078c7dacdb9229e3a99e9f3c65aba26e8cb2299feeb76de1fd9119267d7a3b386026e14a5f5978fd25b191d724f9530a6b6d562c9c5e2a9a4f70d8ed692a19133fc09a15e2bfdaa043d5c77faeadaa994af942ea9fd8eb2667d584e86e180999fedce2984445b30839371d73ee42a0df66b287597c0e2c0dd434086a1056e1d796f4c675bba78324f8fb1e63c5850c7c5dacfbcfd03a74965acffd95b78eb4876703c67393c765fa9eac7a6edb120c3cc6ac35140a56af0097f53a35c9df558ad1a6daca0f768d70d6be9e2d6785a947f436b7426f7c3b2219790510dd22545edc2189b2f10f2f5fc", 0xeb, 0x4000050, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1, 0x1, {0xa, 0x4e20, 0xffffffff, @private1, 0x618f0049}}}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000140)={{}, 0x10000, 0x7, 0x7}) ptrace$cont(0x9, r0, 0x7, 0x7) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) waitid(0x0, r3, 0x0, 0x4000000a, &(0x7f0000000080)) r4 = fork() ptrace$peeksig(0x4209, r4, &(0x7f0000000180)={0x3, 0x1, 0x3}, &(0x7f00000002c0)=[{}, {}, {}]) getpgid(r0) fork() [ 1979.352349] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1979.361246] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:42:44 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:44 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 12:42:44 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0025de602b79a0036e5b9c587000ca"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1979.484012] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 12:42:44 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:44 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 1979.535339] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 12:42:44 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xf0ffffff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:42:44 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 9) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 1979.566397] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:42:44 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 1979.630185] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1979.633374] FAULT_INJECTION: forcing a failure. [ 1979.633374] name failslab, interval 1, probability 0, space 0, times 0 [ 1979.634646] CPU: 0 PID: 102247 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 1979.635388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1979.636273] Call Trace: [ 1979.636563] dump_stack+0x107/0x167 [ 1979.636960] should_fail.cold+0x5/0xa [ 1979.637382] ? create_object.isra.0+0x3a/0xa20 [ 1979.637875] should_failslab+0x5/0x20 [ 1979.638281] kmem_cache_alloc+0x5b/0x360 [ 1979.638716] create_object.isra.0+0x3a/0xa20 [ 1979.639191] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1979.639737] kmem_cache_alloc+0x159/0x360 [ 1979.640224] ? prepare_creds+0x46c/0x5f0 [ 1979.640665] __delayacct_tsk_init+0x1b/0x80 [ 1979.641134] copy_process+0x441a/0x66f0 [ 1979.641560] ? lock_downgrade+0x6d0/0x6d0 [ 1979.642006] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1979.642568] ? __cleanup_sighand+0xb0/0xb0 [ 1979.643029] ? find_held_lock+0x2c/0x110 [ 1979.643466] kernel_clone+0xe7/0xa20 [ 1979.643865] ? lock_downgrade+0x6d0/0x6d0 [ 1979.644323] ? find_held_lock+0x2c/0x110 [ 1979.644755] ? copy_init_mm+0x20/0x20 [ 1979.645170] ? ksys_write+0x12d/0x260 [ 1979.645585] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1979.646113] __do_sys_fork+0x8a/0xc0 [ 1979.646519] ? kernel_clone+0xa20/0xa20 [ 1979.646956] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1979.647527] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1979.648089] ? trace_hardirqs_on+0x5b/0x180 [ 1979.648557] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1979.649118] do_syscall_64+0x33/0x40 [ 1979.649530] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1979.650087] RIP: 0033:0x7fcf2397bb19 [ 1979.650501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1979.652486] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1979.653307] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 1979.654075] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1979.654851] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1979.655619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1979.656395] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 [ 1979.710240] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1979.730599] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1979.738278] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:42:57 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 10) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:42:57 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 12:42:57 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xeaffffff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:42:57 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:57 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:42:57 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000140)={0x32, 0x22, 0x14, 0x1, 0x4, 0x5, 0x4, 0xda, 0xffffffffffffffff}) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xfcffffff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:42:57 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) r2 = getpid() ioprio_get$pid(0x3, r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r4, 0x0, 0x0) kcmp(r1, r0, 0x3, r3, r4) r5 = getpid() ioprio_get$pid(0x3, r5) r6 = fork() r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r7, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r6, 0x7, r3, &(0x7f0000000140)={r4, r7, 0x191b}) waitid(0x0, 0x0, &(0x7f0000000180), 0x2, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x7, 0x7) [ 1992.645373] FAULT_INJECTION: forcing a failure. [ 1992.645373] name failslab, interval 1, probability 0, space 0, times 0 [ 1992.646671] CPU: 0 PID: 102639 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 1992.647433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1992.648331] Call Trace: [ 1992.648620] dump_stack+0x107/0x167 [ 1992.649011] should_fail.cold+0x5/0xa [ 1992.649420] ? dup_fd+0x89/0xcb0 [ 1992.649784] should_failslab+0x5/0x20 [ 1992.650198] kmem_cache_alloc+0x5b/0x360 [ 1992.650638] dup_fd+0x89/0xcb0 [ 1992.650982] ? audit_filter_inodes+0x40/0x40 [ 1992.651463] ? security_task_alloc+0xe6/0x260 [ 1992.651949] copy_process+0x1875/0x66f0 [ 1992.652400] ? lock_downgrade+0x6d0/0x6d0 [ 1992.652849] ? __cleanup_sighand+0xb0/0xb0 [ 1992.653307] ? find_held_lock+0x2c/0x110 [ 1992.653745] kernel_clone+0xe7/0xa20 [ 1992.654163] ? lock_downgrade+0x6d0/0x6d0 [ 1992.654617] ? find_held_lock+0x2c/0x110 [ 1992.655060] ? copy_init_mm+0x20/0x20 [ 1992.655470] ? ksys_write+0x12d/0x260 [ 1992.655887] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1992.656410] __do_sys_fork+0x8a/0xc0 [ 1992.656816] ? kernel_clone+0xa20/0xa20 [ 1992.657259] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1992.657823] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1992.658377] ? trace_hardirqs_on+0x5b/0x180 [ 1992.658842] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1992.659399] do_syscall_64+0x33/0x40 [ 1992.659797] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1992.660355] RIP: 0033:0x7fcf2397bb19 [ 1992.660750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1992.662698] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1992.663516] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 1992.664305] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1992.665063] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1992.665818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1992.666578] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 [ 1992.695233] EXT4-fs error (device loop7): ext4_fill_super:4973: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1992.700438] EXT4-fs (loop7): get root inode failed [ 1992.701263] EXT4-fs (loop7): mount failed [ 1992.706650] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 12:42:57 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) [ 1992.709911] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:42:57 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:42:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xfffff000, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 1992.807671] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1992.811929] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:42:57 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 12:42:58 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:42:58 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) openat(r2, &(0x7f0000000140)='./file1\x00', 0x4040, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000003c0)={@local, @multicast, @void, {@ipv4={0x800, @udp={{0xa, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x33, 0x0, @private=0xa010102, @remote, {[@timestamp_addr={0x44, 0x14, 0x6, 0x1, 0x0, [{@empty}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}}, {0x0, 0x0, 0x8}}}}}, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x20881, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000080)={0x30, 0x39, 0xe, 0xa, 0x0, 0x80, 0x3, 0x80}) dup(0xffffffffffffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) 12:42:58 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) clone3(&(0x7f0000000340)={0x10c800000, &(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100), {0x5}, &(0x7f0000000140)=""/213, 0xd5, &(0x7f0000000240)=""/145, &(0x7f0000000300)=[r0, r0, r0, r0, r0, r0], 0x6}, 0x58) ioctl$BINDER_FREEZE(0xffffffffffffffff, 0x400c620e, &(0x7f00000003c0)={r1, 0x0, 0x1}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)={0x0, 0x0}) capset(&(0x7f00000004c0)={0x19980330, r2}, &(0x7f0000000500)={0x101, 0x80000001, 0x9, 0xd8f, 0x8, 0x490d}) r3 = getpid() r4 = syz_open_dev$mouse(&(0x7f0000000540), 0x57041bd8, 0x1c1800) r5 = getpid() ioprio_get$pid(0x3, r5) ioctl$BINDER_FREEZE(r4, 0x400c620e, &(0x7f0000000580)={r5, 0x1, 0x7}) ioprio_get$pid(0x3, r3) ptrace$setsig(0x4203, r3, 0x9, &(0x7f0000000400)={0x7, 0x25db4a30, 0x10001}) ptrace$setsig(0x4203, r0, 0x0, &(0x7f0000000000)={0x36, 0x1f, 0x7}) [ 1993.049319] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1993.088229] EXT4-fs error (device loop7): ext4_fill_super:4973: inode #2: comm syz-executor.7: iget: root inode unallocated [ 1993.090529] EXT4-fs (loop7): get root inode failed [ 1993.091168] EXT4-fs (loop7): mount failed [ 1993.202599] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:43:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xffffff7f, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:43:11 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:43:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:11 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x180000000, 0x4}, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mount(&(0x7f0000000140)=@md0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='tracefs\x00', 0x2000000, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000340)={0x401, 0x40, '\x00', 0x1, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r3 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x1, r3) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x6, 0x3f, 0x4, 0x1, 0x0, 0xffffffffffff8000, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa1, 0x2, @perf_bp={&(0x7f0000000240), 0x9}, 0x200, 0x3, 0x80, 0x7, 0x7, 0xe6fc, 0x81, 0x0, 0x4, 0x0, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x2) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:11 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 1) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "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", "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"}) semop(0x0, &(0x7f0000000000)=[{0x3, 0x293, 0x1000}, {0x0, 0x8ac, 0x800}], 0x2) r1 = fork() ptrace(0x10, r1) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r1, 0x7, 0x7) 12:43:11 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 11) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2006.666685] FAULT_INJECTION: forcing a failure. [ 2006.666685] name failslab, interval 1, probability 0, space 0, times 0 [ 2006.669374] CPU: 1 PID: 103187 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2006.670824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2006.672540] Call Trace: [ 2006.673096] dump_stack+0x107/0x167 [ 2006.673838] should_fail.cold+0x5/0xa [ 2006.674620] ? __do_sys_memfd_create+0xfb/0x450 [ 2006.675582] should_failslab+0x5/0x20 [ 2006.676377] __kmalloc+0x72/0x3f0 [ 2006.677098] __do_sys_memfd_create+0xfb/0x450 [ 2006.678016] ? ksys_write+0x1a9/0x260 [ 2006.678792] ? memfd_file_seals_ptr+0x170/0x170 [ 2006.679756] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2006.680857] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2006.681922] do_syscall_64+0x33/0x40 [ 2006.682694] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2006.683747] RIP: 0033:0x7ffb28734b19 [ 2006.684517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2006.688301] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2006.689871] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2006.691339] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2006.692814] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2006.694272] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2006.695739] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2006.750296] FAULT_INJECTION: forcing a failure. [ 2006.750296] name failslab, interval 1, probability 0, space 0, times 0 [ 2006.753148] CPU: 1 PID: 103198 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 2006.754619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2006.756422] Call Trace: [ 2006.756995] dump_stack+0x107/0x167 [ 2006.757779] should_fail.cold+0x5/0xa [ 2006.758598] ? create_object.isra.0+0x3a/0xa20 [ 2006.759540] should_failslab+0x5/0x20 [ 2006.760357] kmem_cache_alloc+0x5b/0x360 [ 2006.761195] create_object.isra.0+0x3a/0xa20 [ 2006.762098] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2006.763136] kmem_cache_alloc+0x159/0x360 [ 2006.763992] dup_fd+0x89/0xcb0 [ 2006.764654] ? audit_filter_inodes+0x40/0x40 [ 2006.765576] ? security_task_alloc+0xe6/0x260 [ 2006.766502] copy_process+0x1875/0x66f0 [ 2006.767325] ? lock_downgrade+0x6d0/0x6d0 [ 2006.768190] ? __cleanup_sighand+0xb0/0xb0 [ 2006.769068] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2006.770191] ? kernel_clone+0x75/0xa20 [ 2006.770997] kernel_clone+0xe7/0xa20 [ 2006.771766] ? lock_downgrade+0x6d0/0x6d0 [ 2006.772632] ? find_held_lock+0x2c/0x110 [ 2006.773465] ? copy_init_mm+0x20/0x20 [ 2006.774250] ? ksys_write+0x12d/0x260 [ 2006.775038] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2006.776034] __do_sys_fork+0x8a/0xc0 [ 2006.776809] ? kernel_clone+0xa20/0xa20 [ 2006.777641] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2006.778728] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2006.779787] ? trace_hardirqs_on+0x5b/0x180 [ 2006.780688] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2006.781743] do_syscall_64+0x33/0x40 [ 2006.782508] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2006.783556] RIP: 0033:0x7fcf2397bb19 [ 2006.784327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2006.788084] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2006.789659] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 2006.791119] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2006.792584] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2006.794038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2006.795488] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 12:43:11 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2006.807290] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2006.895275] EXT4-fs error (device loop7): ext4_fill_super:4973: inode #2: comm syz-executor.7: iget: root inode unallocated [ 2006.927626] EXT4-fs (loop7): get root inode failed [ 2006.929250] EXT4-fs (loop7): mount failed [ 2006.955538] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated 12:43:12 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 2) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2006.970678] EXT4-fs (loop4): get root inode failed [ 2006.971835] EXT4-fs (loop4): mount failed 12:43:12 executing program 0: r0 = fork() ptrace(0x8, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x38, r0, 0x7, 0x7) 12:43:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xffffff8c, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:43:12 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2007.051215] FAULT_INJECTION: forcing a failure. [ 2007.051215] name failslab, interval 1, probability 0, space 0, times 0 [ 2007.053400] CPU: 1 PID: 103615 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2007.054458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2007.055721] Call Trace: [ 2007.056138] dump_stack+0x107/0x167 [ 2007.056715] should_fail.cold+0x5/0xa [ 2007.057307] ? create_object.isra.0+0x3a/0xa20 [ 2007.058013] should_failslab+0x5/0x20 [ 2007.058606] kmem_cache_alloc+0x5b/0x360 [ 2007.059237] create_object.isra.0+0x3a/0xa20 [ 2007.059923] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2007.060721] __kmalloc+0x16e/0x3f0 [ 2007.061301] __do_sys_memfd_create+0xfb/0x450 [ 2007.062011] ? ksys_write+0x1a9/0x260 [ 2007.062604] ? memfd_file_seals_ptr+0x170/0x170 [ 2007.063345] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2007.064171] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2007.064993] do_syscall_64+0x33/0x40 [ 2007.065577] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2007.066382] RIP: 0033:0x7ffb28734b19 [ 2007.066970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2007.069904] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2007.071115] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2007.072262] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2007.073404] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2007.074545] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2007.075686] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:43:12 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:12 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="fe"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x2047e3, 0x0) fchown(r2, 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140), 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000001c0)={0x4, 0x5, 0xfff, 0x10001, 0x8}) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2007.142445] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2007.157343] EXT4-fs (loop1): get root inode failed [ 2007.158261] EXT4-fs (loop1): mount failed 12:43:12 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() (fail_nth: 12) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2007.204359] EXT4-fs (loop7): invalid first ino: 0 12:43:12 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2007.244597] EXT4-fs (loop3): Unrecognized mount option "þ" or missing value [ 2007.298399] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2007.331550] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2007.360850] FAULT_INJECTION: forcing a failure. [ 2007.360850] name failslab, interval 1, probability 0, space 0, times 0 [ 2007.363179] CPU: 1 PID: 103925 Comm: syz-executor.6 Not tainted 5.10.156 #1 [ 2007.364282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2007.365590] Call Trace: [ 2007.366014] dump_stack+0x107/0x167 [ 2007.366604] should_fail.cold+0x5/0xa [ 2007.367220] ? alloc_fdtable+0x84/0x280 [ 2007.367864] should_failslab+0x5/0x20 [ 2007.368496] kmem_cache_alloc_trace+0x55/0x360 [ 2007.369224] ? rwlock_bug.part.0+0x90/0x90 [ 2007.369910] alloc_fdtable+0x84/0x280 [ 2007.370707] dup_fd+0x722/0xcb0 [ 2007.371401] copy_process+0x1875/0x66f0 [ 2007.372052] ? lock_downgrade+0x6d0/0x6d0 [ 2007.372724] ? __cleanup_sighand+0xb0/0xb0 [ 2007.373407] ? find_held_lock+0x2c/0x110 [ 2007.374080] kernel_clone+0xe7/0xa20 [ 2007.374785] ? lock_downgrade+0x6d0/0x6d0 [ 2007.375585] ? find_held_lock+0x2c/0x110 [ 2007.376400] ? copy_init_mm+0x20/0x20 [ 2007.377117] ? ksys_write+0x12d/0x260 [ 2007.377912] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2007.378870] __do_sys_fork+0x8a/0xc0 [ 2007.379575] ? kernel_clone+0xa20/0xa20 [ 2007.380398] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2007.381420] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2007.382278] ? trace_hardirqs_on+0x5b/0x180 [ 2007.383108] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2007.384066] do_syscall_64+0x33/0x40 [ 2007.384830] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2007.385760] RIP: 0033:0x7fcf2397bb19 [ 2007.386453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2007.389883] RSP: 002b:00007fcf20ef1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2007.391280] RAX: ffffffffffffffda RBX: 00007fcf23a8ef60 RCX: 00007fcf2397bb19 [ 2007.392462] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2007.393843] RBP: 00007fcf20ef11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2007.394979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2007.396271] R13: 00007fff28b0aabf R14: 00007fcf20ef1300 R15: 0000000000022000 [ 2007.446458] cgroup: fork rejected by pids controller in /syz6 [ 2007.455120] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2007.458636] EXT4-fs (loop4): get root inode failed [ 2007.459712] EXT4-fs (loop4): mount failed 12:43:25 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:43:25 executing program 0: r0 = fork() ptrace(0x10, r0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/22, 0x16}, {&(0x7f00000000c0)=""/153, 0x99}], 0x2, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x10020) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)={0x4, r1}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() ptrace$setsig(0x4203, r2, 0xb2f, &(0x7f0000000280)={0x1d, 0x3, 0x3d226a12}) ptrace$cont(0x9, r0, 0x7, 0x7) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x1, 0x7, 0x0, 0x2, 0x0, 0x900000000000000, 0x29000, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xe547, 0x1, @perf_config_ext={0x4, 0x8615}, 0x10c08, 0x2, 0x8001, 0x8, 0x9, 0x9, 0x3f, 0x0, 0x5, 0x0, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0xd) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) ptrace(0x11, r3) 12:43:25 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2020.051752] FAULT_INJECTION: forcing a failure. [ 2020.051752] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2020.054649] CPU: 1 PID: 104261 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2020.056213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2020.058076] Call Trace: [ 2020.058673] dump_stack+0x107/0x167 [ 2020.059491] should_fail.cold+0x5/0xa [ 2020.060341] _copy_from_user+0x2e/0x1b0 [ 2020.061239] __do_sys_memfd_create+0x16d/0x450 [ 2020.062261] ? memfd_file_seals_ptr+0x170/0x170 [ 2020.063310] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2020.064490] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2020.065647] do_syscall_64+0x33/0x40 [ 2020.066484] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2020.067632] RIP: 0033:0x7ffb28734b19 [ 2020.068468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2020.072566] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2020.074245] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2020.075819] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2020.077401] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2020.078998] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2020.080606] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:43:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xffffff9e, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:43:25 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 3) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:25 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:43:25 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:25 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f8e854d8153ef010001000000dff4655f00000000ea00000001000000000000000b0000000001a8df76e6aeaebe1a7ad7c3d7ac5ee254342e61b789ffd0eba4dca2fe241bf89decd9ea3960c5", 0x80, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2020.123367] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2020.124795] EXT4-fs (loop1): get root inode failed [ 2020.125387] EXT4-fs (loop1): mount failed [ 2020.149218] EXT4-fs (loop7): invalid first ino: 0 [ 2020.151355] EXT4-fs (loop3): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 2020.170209] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2020.174306] EXT4-fs (loop4): get root inode failed [ 2020.174996] EXT4-fs (loop4): mount failed 12:43:25 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 4) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xffffffea, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:43:25 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2020.280714] FAULT_INJECTION: forcing a failure. [ 2020.280714] name failslab, interval 1, probability 0, space 0, times 0 [ 2020.283680] CPU: 1 PID: 104788 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2020.285256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2020.287124] Call Trace: [ 2020.287712] dump_stack+0x107/0x167 [ 2020.288521] should_fail.cold+0x5/0xa [ 2020.289371] ? shmem_alloc_inode+0x18/0x40 [ 2020.290334] should_failslab+0x5/0x20 [ 2020.291175] kmem_cache_alloc+0x5b/0x360 [ 2020.292074] ? shmem_destroy_inode+0x70/0x70 [ 2020.293058] shmem_alloc_inode+0x18/0x40 [ 2020.293978] ? shmem_destroy_inode+0x70/0x70 [ 2020.294967] alloc_inode+0x63/0x240 [ 2020.295764] new_inode+0x23/0x250 [ 2020.296544] shmem_get_inode+0x15e/0xbc0 [ 2020.297441] __shmem_file_setup+0xb8/0x320 [ 2020.298372] ? _copy_from_user+0xfb/0x1b0 [ 2020.299287] __do_sys_memfd_create+0x275/0x450 [ 2020.300290] ? memfd_file_seals_ptr+0x170/0x170 [ 2020.301343] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2020.302495] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2020.303634] do_syscall_64+0x33/0x40 [ 2020.304459] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2020.305601] RIP: 0033:0x7ffb28734b19 [ 2020.306412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2020.310437] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2020.312097] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2020.313669] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2020.315224] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2020.316809] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2020.318375] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:43:25 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2800, 0x79a6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getdents(r1, &(0x7f0000000140)=""/34, 0x22) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, 0x0) symlinkat(&(0x7f0000000000)='./file0/file1\x00', 0xffffffffffffffff, &(0x7f0000000680)='./file0\x00') renameat(0xffffffffffffffff, &(0x7f00000001c0)='./file2\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0/file1\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0)=0x400, 0x86) 12:43:25 executing program 0: r0 = fork() ptrace(0x8, r0) ptrace(0x10, r0) getpid() r1 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = epoll_create(0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000100)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioprio_get$pid(0xf2745356aac35e4d, r4) waitid(0x0, r1, 0x0, 0x21000009, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x80, 0x1, 0x3f, 0x0, 0x0, 0x4005, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x6e, 0x6}, 0x46480, 0x9, 0x8000, 0x5, 0x8, 0x3f, 0x4, 0x0, 0x7, 0x0, 0x80000001}, 0x0, 0x7, 0xffffffffffffffff, 0x12) ptrace$getenv(0x4201, r0, 0x8, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x7, 0x7) 12:43:25 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f0000000140)={0x1, 0x12}) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:25 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2020.468213] EXT4-fs (loop7): invalid first ino: 0 [ 2020.526964] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2020.546440] EXT4-fs (loop1): get root inode failed [ 2020.547613] EXT4-fs (loop1): mount failed [ 2020.633769] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:43:40 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 5) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:40 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xfffffff0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2035.361742] FAULT_INJECTION: forcing a failure. [ 2035.361742] name failslab, interval 1, probability 0, space 0, times 0 [ 2035.363098] CPU: 1 PID: 105425 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2035.363845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2035.364762] Call Trace: [ 2035.365052] dump_stack+0x107/0x167 [ 2035.365459] should_fail.cold+0x5/0xa [ 2035.365883] ? create_object.isra.0+0x3a/0xa20 [ 2035.366374] should_failslab+0x5/0x20 [ 2035.366797] kmem_cache_alloc+0x5b/0x360 [ 2035.367249] create_object.isra.0+0x3a/0xa20 [ 2035.367731] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2035.368286] kmem_cache_alloc+0x159/0x360 [ 2035.368757] ? shmem_destroy_inode+0x70/0x70 [ 2035.369237] shmem_alloc_inode+0x18/0x40 [ 2035.369681] ? shmem_destroy_inode+0x70/0x70 [ 2035.370154] alloc_inode+0x63/0x240 [ 2035.370550] new_inode+0x23/0x250 [ 2035.370928] shmem_get_inode+0x15e/0xbc0 [ 2035.371377] __shmem_file_setup+0xb8/0x320 [ 2035.371833] ? _copy_from_user+0xfb/0x1b0 [ 2035.372284] __do_sys_memfd_create+0x275/0x450 [ 2035.372800] ? memfd_file_seals_ptr+0x170/0x170 [ 2035.373316] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2035.374080] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2035.374686] do_syscall_64+0x33/0x40 [ 2035.375210] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2035.375777] RIP: 0033:0x7ffb28734b19 [ 2035.376191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2035.378194] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2035.379021] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2035.379793] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2035.380575] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2035.381351] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2035.382128] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2035.403496] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2035.405637] EXT4-fs (loop1): get root inode failed [ 2035.406206] EXT4-fs (loop1): mount failed 12:43:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:40 executing program 0: r0 = fork() r1 = getpid() ioprio_get$pid(0x3, r1) ptrace(0x10, r0) ptrace(0x4207, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x28, &(0x7f0000000000)={0x41, 0x3, 0x6}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r2) ptrace$cont(0x9, r0, 0x7, 0x7) 12:43:40 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:43:40 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) ftruncate(r3, 0x81) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) read(r2, &(0x7f00000002c0)=""/247, 0xf7) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:40 executing program 6: r0 = fork() ptrace(0x10, r0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r2, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = getpid() ioprio_get$pid(0x3, r4) fcntl$setown(r1, 0x8, r4) r5 = fork() syz_open_procfs(r5, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) 12:43:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1d, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32343530303330383600"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000b138543112eb43ac9dbc7e1411f64d55010040000c00000000000000d7f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000980)="01000000000005004000000000000000000000000000000034000000000000006edac26e7857a0f6cb2cc30ff74cd37ac04c122142d45ee3b97b9ef11bf3b8abae205a472be38595125a0b931b60bac2c0b0447c56380500c51584f5dc77ec1f884ac6cc4843", 0x66, 0x560}, {&(0x7f0000010300)="03000000040000000500000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d7f4655fd7f4655fd7f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1480}, {&(0x7f0000010e00)="8081000000300404d7f4655fd7f4655fd7f4655f00000000000001002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000", 0x60, 0x1700}, {&(0x7f0000010f00)="c041000000300000d7f4655fd7f4655fd7f4655f00000000000002002000000000000800000000000af301000400000000000000000000000c00000020000000", 0x40, 0x1900}, {&(0x7f0000011000)="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"/768, 0x300, 0x1980}, {&(0x7f0000011300)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011400)="0b0000000c0001022e00000002000000f40302022e2e00"/32, 0x20, 0x9}, {&(0x7f0000011500)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011600)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011700)="00000000000400"/32, 0x20, 0x8c00}, {&(0x7f0000011800)="00000000000400"/32, 0x20, 0x9000}, {&(0x7f0000011900)="00000000000400"/32, 0x20, 0x9400}, {&(0x7f0000011a00)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000011b00)="00000000000400"/32, 0x20, 0x8}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000011d00)="0000000000040000000000000000000000000085466126fb3fe409728371aafb", 0x20, 0xa400}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0xac00}, {&(0x7f0000012000)="504d4d00504d4dffd8f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7032390075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x10000}, {&(0x7f0000012100)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d803050766696c653100"/64, 0x40, 0x14000}, {&(0x7f00000004c0)="73797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273787a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797aeb616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c00000000000057f7ddf427daa22e76740eb39caf331249af718931ce30975ddf7eb33c119ff41f1f4bbe60b7c320c59d18316590903f5f3ca1094599206939ab0ab230d3237e38063e0191dae36ea84e8c7b20cbc208e1b09da6d70dc660242897bd5caf4c9c634b59b372c4ac8b3f4a162bfffb3f88ddfac3a7aa19f5978bca642cb293a514ffd4fbb659ce56b96d0e8e747c9cfc3651fe", 0x4b2, 0x18000}, {&(0x7f0000012700)='syzkallers\x00'/32, 0x20, 0x4000001c000}, {&(0x7f0000012800)="000002ea0100000001000000270f240c000000000000000000000000000000000601f8030000000006000000779b539778617474723100000601f00300000000060000007498539778617474723200"/96, 0x60, 0x20000}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xattr2\x00\x00xattr1\x00\x00', 0x20, 0x203e0}, {&(0x7f0000012a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x28000}], 0x0, &(0x7f0000012b00)) [ 2035.455374] EXT4-fs (loop7): unsupported inode size: 0 [ 2035.456477] EXT4-fs (loop7): blocksize: 2048 [ 2035.472412] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2035.473480] ext4 filesystem being mounted at /syzkaller-testdir430960116/syzkaller.IPeDgl/237/file0 supports timestamps until 2038 (0x7fffffff) 12:43:40 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) r4 = fork() getpgid(r4) 12:43:40 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:43:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086607, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000000), &(0x7f00000000c0)=@sha1={0x1, "ed8fe07a63581fcf349c4412c918b82558811199"}, 0x15, 0x3) 12:43:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2035.696329] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2035.697787] EXT4-fs (loop1): get root inode failed [ 2035.698344] EXT4-fs (loop1): mount failed [ 2035.702177] EXT4-fs (loop7): unsupported inode size: 0 [ 2035.702795] EXT4-fs (loop7): blocksize: 2048 12:43:40 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xfffffffc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:43:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:40 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:43:41 executing program 0: r0 = fork() fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) ptrace$setopts(0x4200, r1, 0xffffffff, 0x100002) ptrace$cont(0x9, r0, 0x7, 0x7) [ 2035.843301] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2035.846404] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2035.878507] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:43:41 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 6) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:41 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) fork() r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() r4 = syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(r4, &(0x7f0000001680)='./file0\x00', 0x6000, 0x20, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:43:41 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xffffffff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2036.018208] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2036.025593] FAULT_INJECTION: forcing a failure. [ 2036.025593] name failslab, interval 1, probability 0, space 0, times 0 [ 2036.027195] CPU: 1 PID: 106190 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2036.027953] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2036.028900] Call Trace: [ 2036.029200] dump_stack+0x107/0x167 [ 2036.029616] should_fail.cold+0x5/0xa [ 2036.030044] ? security_inode_alloc+0x34/0x160 [ 2036.030545] should_failslab+0x5/0x20 [ 2036.030971] kmem_cache_alloc+0x5b/0x360 [ 2036.031439] security_inode_alloc+0x34/0x160 [ 2036.031923] inode_init_always+0xa4e/0xd10 [ 2036.032390] ? shmem_destroy_inode+0x70/0x70 [ 2036.032889] alloc_inode+0x84/0x240 [ 2036.033297] new_inode+0x23/0x250 [ 2036.033677] shmem_get_inode+0x15e/0xbc0 [ 2036.034130] __shmem_file_setup+0xb8/0x320 [ 2036.034592] ? _copy_from_user+0xfb/0x1b0 [ 2036.035045] __do_sys_memfd_create+0x275/0x450 [ 2036.035120] EXT4-fs (loop1): get root inode failed [ 2036.035547] ? memfd_file_seals_ptr+0x170/0x170 [ 2036.035563] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2036.035584] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2036.036721] EXT4-fs (loop1): mount failed [ 2036.037164] do_syscall_64+0x33/0x40 [ 2036.037176] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2036.037183] RIP: 0033:0x7ffb28734b19 [ 2036.037193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2036.037207] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2036.043552] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2036.044349] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2036.045143] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2036.045919] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2036.046689] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2036.074556] EXT4-fs (loop7): unsupported inode size: 0 [ 2036.076312] EXT4-fs (loop7): blocksize: 2048 12:43:41 executing program 0: r0 = fork() ptrace(0x10, r0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040), 0x6e, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/151, 0x97}, {&(0x7f0000000180)=""/73, 0x49}, {&(0x7f0000000200)=""/246, 0xf6}, {&(0x7f0000000300)=""/120, 0x78}], 0x4, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x140}, 0x12000) ptrace$getenv(0x4201, r1, 0xffffffff, &(0x7f0000000540)) waitid(0x0, 0x0, 0x0, 0x0, 0x0) fork() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace(0x8, r2) ptrace$cont(0x9, r0, 0x7, 0x7) 12:43:41 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xad}, 0x6188, 0x400000000000000, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x6) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2036.262242] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:43:55 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0xffffffff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:43:55 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 7) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:55 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:55 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r2 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7, 0x8, &(0x7f00000007c0)=[{&(0x7f0000000200)="a16ac65165d27bcdabaea3c116ce318a43002ee862d21e869e22197440baa5ea91fb187632c66bac2ea70f613e32abbdb863a237605aeaec7e21d1785106c2ab5b6a1ff6f9ff17a7f279cdd387af3f9cc60af9c72f80764b82e339a6d2207ffe0780e42cde33c9817f338d4aa5fcd75365f369c53ff3fdd7f50c87b575cd6283086fc3f7f656e0d3229985a2e1abb026fbeedbcf67687e2306bbab3007a7b0a30576acefcbfd07c0cd03abdb3eac10fa0c9c3f6b2e7996599477a5b82a446d180a1ce82718ae70cc5d812f6f58e6a0d35f881097fd4a4b42aea3ae5a6283b3b50addb85194ebaf1f", 0xe8, 0x6}, {&(0x7f0000000300)="46be3bed81f58b0d5e9fa0c2608d46f6694d2d8bc262c2f518bdae60b9d121df031aedee511e33812dc02e9cbda024b41d644be250aa5478b67beab5230c27cd428d6b5f14e90f5ab668f97cbc0c9d54756ef9638f5a4f21124dc1832f1b11ffa24aead375a395b689d4e2cce4e09c159b82266e67dddd666ce109a1886d5483b53bdccc55b35cead4be4826d639ee1b03be8c76083400ae06accf16b4e398ef0947baf7e5dd80a38ee2663cf6bfc4acea8a3e8080b4ea53ba4c01fcba1981d11fe8135e8f9b7cc1f8448d87f51f292f9788f847c0d2ad100abf269fd35f287f640430e193a620fe82e4bc59cf", 0xed, 0x5}, {&(0x7f00000004c0)="88b9dcaa07633759289e51d7a4180a459f4f22e166da5721618cd550154800921d43afc6239c708552627b908e712e33af996e3696606bbaeab53562acf3f802958e3e65ba66888a1e181b65a5af19c56d5300f6e410eeb8b844fe68c64bdd2a836776870823fe9765470e3a826ca069206b42e40c7c1b7231f982faa00d113c39471f63623777a3e2b31126599cb10ed13afb63058ffb7ee243123f15b05353fe1b1e09197bceaa6508e5acd3", 0xad, 0xa1}, {&(0x7f0000000400)="7e4868bba5434a7467b0f0e4f5279507b039c4a5fe6073f48305b0012b36d69e86a7cfda987fd8a0", 0x28, 0x4}, {&(0x7f0000000580)="2bd2d72df1f67d958af1be86b3d084051647db15a1c1ab88d3c827d7ea86f3211b695e3b7aa68c029660a614f137ffb0c30f6860d04ff5dd1ac5fa119c57e3ae", 0x40, 0x8d}, {&(0x7f00000005c0)="6bc196da085a9a4128b097cf949bab5a564b5d093a941790db13d15508c234049000dfd981145e15e2eda2cbd06f83686a595902206b5ba4ac02b132442702385e200e75d426a9e55f24ac3e7787aff762cce3605ba1bbdcd54353d986148efb625a6dc94d2391d4354407672f8ba57f02b825b2b2dff0441e8a091055cd8010683c0e76d57113f7", 0x88, 0xfe6}, {&(0x7f0000000680)="26853139edabae637abb478e3548dd54869b7efc77d4951960bb9ae39963", 0x1e, 0x8}, {&(0x7f00000006c0)="400f15235e4dbab56d22f499ac39bb8951a8111c0df93b2101faf38762d731d52dfcbead90cbf242cbad05588e15d687585f1dff2791174017e15aff44f24cb1c0ca81e2a16eddf07854958d5e50283cf17b51893c335855f8483e6ea7e4c8803a1588d8173498cc8ceefc6b5c8c1e507160d178d7fc8e99e18c4adc89e1e54bb73d803e7970e97ac807ba7c3a69fbc27c0538d702478d279456a1cfd49870972f38c1a03ccde9b6e2a7fb3a1af6bc0d76c78a78b6857a0d9090f098d284b3ab1cf24d5f6c0ddea46aec55b91c97c3cda8fc638972d7a0aaab93d0b2957ff870", 0xe0, 0x48}], 0x824, &(0x7f0000000880)=ANY=[@ANYBLOB='shortname=lower,euid<', @ANYRESDEC=0xee01, @ANYBLOB="5ec4"]) openat(r2, &(0x7f00000008c0)='./file0\x00', 0x608000, 0x80) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:55 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x40000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000780), 0x9}, 0x0, 0x95b, 0x0, 0x0, 0x0, 0x0, 0xf761}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x0, 0x80, 0x2, 0x0, 0x5, 0x7, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7f, 0x7, @perf_bp={&(0x7f0000000880)}, 0x2004, 0x2, 0x5, 0x7, 0x7, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x9) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r2 = fork() shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000006c0)=""/162) syz_open_procfs(r0, &(0x7f0000000040)='io\x00') perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x0, 0x8, 0x6, 0xff, 0x0, 0x80000001, 0x8842a, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffff001, 0x1, @perf_config_ext={0x1ff, 0x5}, 0x0, 0x7, 0x5, 0x1, 0x3, 0x10000, 0x1, 0x0, 0x20, 0x0, 0x9}, r2, 0x1, 0xffffffffffffffff, 0xb) shmget$private(0x0, 0x3000, 0x40, &(0x7f0000ffd000/0x3000)=nil) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x7702ec8a2128ed38, 0x100, &(0x7f0000000940)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r2, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:43:55 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:43:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x3}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:43:55 executing program 0: r0 = fork() ptrace(0x10, r0) r1 = getpgid(r0) tkill(r1, 0x13) waitid(0x0, 0x0, 0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0x4, 0x0, 0x10, 0x0, 0x8, 0xa000, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffffff47, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x10000, 0xbf, 0xa0f, 0x4, 0x1ff, 0x7ff, 0x6, 0x0, 0x80000001, 0x0, 0x7fffffff}, 0x0, 0xc, 0xffffffffffffffff, 0x8) ptrace$cont(0x9, r0, 0x2000006, 0x7) [ 2050.376794] FAULT_INJECTION: forcing a failure. [ 2050.376794] name failslab, interval 1, probability 0, space 0, times 0 [ 2050.377702] EXT4-fs (loop7): unsupported inode size: 0 [ 2050.380470] CPU: 0 PID: 106804 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2050.380481] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2050.380487] Call Trace: [ 2050.380513] dump_stack+0x107/0x167 [ 2050.380536] should_fail.cold+0x5/0xa [ 2050.380557] ? create_object.isra.0+0x3a/0xa20 [ 2050.380578] should_failslab+0x5/0x20 [ 2050.380596] kmem_cache_alloc+0x5b/0x360 [ 2050.380621] create_object.isra.0+0x3a/0xa20 [ 2050.380640] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2050.380666] kmem_cache_alloc+0x159/0x360 [ 2050.380695] security_inode_alloc+0x34/0x160 [ 2050.381877] EXT4-fs (loop7): blocksize: 2048 [ 2050.383930] inode_init_always+0xa4e/0xd10 [ 2050.383953] ? shmem_destroy_inode+0x70/0x70 [ 2050.383973] alloc_inode+0x84/0x240 [ 2050.383990] new_inode+0x23/0x250 [ 2050.384012] shmem_get_inode+0x15e/0xbc0 [ 2050.384041] __shmem_file_setup+0xb8/0x320 [ 2050.384059] ? _copy_from_user+0xfb/0x1b0 [ 2050.384081] __do_sys_memfd_create+0x275/0x450 [ 2050.384101] ? memfd_file_seals_ptr+0x170/0x170 [ 2050.384126] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2050.384148] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2050.384171] do_syscall_64+0x33/0x40 [ 2050.384194] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2050.406234] RIP: 0033:0x7ffb28734b19 [ 2050.407070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2050.411189] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2050.412912] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2050.414508] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb 12:43:55 executing program 4: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) r4 = fork() getpgid(r4) [ 2050.416114] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2050.417831] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2050.419421] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2050.511357] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2050.514490] EXT4-fs (loop1): get root inode failed [ 2050.515242] EXT4-fs (loop1): mount failed 12:43:55 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:43:55 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x87) 12:43:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x4}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:43:55 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x2, r0, &(0x7f0000000000), 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x7, 0x7) [ 2050.766297] EXT4-fs (loop7): unsupported inode size: 0 [ 2050.767713] EXT4-fs (loop7): blocksize: 2048 12:43:56 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) ptrace$getregset(0x4204, 0x0, 0x201, &(0x7f00000005c0)={&(0x7f00000004c0)=""/208, 0xd0}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r2 = fork() syz_open_procfs(r2, &(0x7f0000000300)='net/nfsfs\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f00000002c0)=r2, 0x12) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000800)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x100, 0x10, &(0x7f00000006c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r2, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2050.895648] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2050.904537] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2050.922847] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:44:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x5}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:44:09 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:09 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = getpid() ioprio_get$pid(0x3, r2) ptrace$setregs(0xf, r2, 0x81, &(0x7f00000006c0)="e87bd618ff871bcced5299ce67bb2d7b2ecf453a794a4850c77d791e6b53a32affd629fa04dd7ab5e23ad1e820c171357f93cb0e40495deea42359d6d3af5b03eddcbc76b50b5ae3fdc8248199f77f6a2ba0158fe70d2a89908ae095a45876540141fae2a68e6f8e5305770bf45f900b7aa5692e486c37580b31eb18ea25d9c86abaa96909bc531bf3f77d1429175f1702afe97a810425fe033407f71363f3fefb1a7f0e85ff5467dde266453f11d4ee01334647cf73bd56045381ef2ad25e54d34670394329d3fb95c6aaf9ec9cd986acccdcbc84a0e4083e4459862cb2c1a0da5b74483f") r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() syz_open_procfs(r4, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r4, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:44:09 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0x200}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/bus/mdio_bus', 0x40001, 0x32) ioctl$RTC_PIE_OFF(r3, 0x7006) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:09 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:09 executing program 0: r0 = fork() ptrace(0x11, r0) r1 = getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r3 = pidfd_open(r2, 0x0) ioprio_get$pid(0x3, r1) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x5, 0x9) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000300)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) sendmsg$nl_generic(r4, &(0x7f0000001440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001400)={&(0x7f0000000380)={0x1078, 0x2e, 0x10, 0x70bd27, 0x25dfdbff, {0x3}, [@typed={0x6, 0x4e, 0x0, 0x0, @str='\'\x00'}, @generic="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", @typed={0x14, 0x1d, 0x0, 0x0, @ipv6=@local}, @typed={0x4, 0x8f}, @generic="84e77a5546b855bc7850016bb4141837e180abee23ed3047dc13a4799c5bf82ba59f5c17b486292837d4f9fbb326a2beac37aad5ae8a14deb5e863e147a82e2171d83d69"]}, 0x1078}, 0x1, 0x0, 0x0, 0x10}, 0x4044) 12:44:09 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 8) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2064.685163] FAULT_INJECTION: forcing a failure. [ 2064.685163] name failslab, interval 1, probability 0, space 0, times 0 [ 2064.687754] CPU: 1 PID: 107873 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2064.689196] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2064.690868] Call Trace: [ 2064.691416] dump_stack+0x107/0x167 [ 2064.692156] should_fail.cold+0x5/0xa [ 2064.692939] ? __d_alloc+0x2a/0x990 [ 2064.693705] should_failslab+0x5/0x20 [ 2064.694489] kmem_cache_alloc+0x5b/0x360 [ 2064.695323] ? trace_hardirqs_on+0x5b/0x180 [ 2064.696209] __d_alloc+0x2a/0x990 [ 2064.696926] d_alloc_pseudo+0x19/0x70 [ 2064.697709] alloc_file_pseudo+0xce/0x250 [ 2064.698550] ? alloc_file+0x5a0/0x5a0 [ 2064.699335] ? shmem_get_inode+0x55c/0xbc0 [ 2064.700199] __shmem_file_setup+0x144/0x320 [ 2064.701099] ? _copy_from_user+0xfb/0x1b0 [ 2064.701945] __do_sys_memfd_create+0x275/0x450 [ 2064.702876] ? memfd_file_seals_ptr+0x170/0x170 [ 2064.703821] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2064.704892] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2064.705945] do_syscall_64+0x33/0x40 [ 2064.706702] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2064.707746] RIP: 0033:0x7ffb28734b19 [ 2064.708503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2064.712234] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2064.713788] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2064.715228] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2064.716662] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2064.718113] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2064.719549] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2064.745375] EXT4-fs (loop7): unsupported inode size: 0 [ 2064.746819] EXT4-fs (loop7): blocksize: 2048 [ 2064.749036] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2064.751665] EXT4-fs (loop1): get root inode failed [ 2064.752730] EXT4-fs (loop1): mount failed 12:44:09 executing program 4: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) r4 = fork() getpgid(r4) 12:44:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x8}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:44:10 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:10 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 9) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:10 executing program 6: r0 = fork() ptrace(0x10, r0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f00000002c0), 0x82802, 0x0) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000300), 0x8000, 0x0) close_range(r4, r5, 0x0) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:44:10 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r0, 0x0, 0x0) getsockopt(r0, 0x5, 0x80000001, &(0x7f0000000080)=""/226, &(0x7f0000000180)=0xe2) r1 = fork() ptrace(0x10, r1) waitid(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x3, r1, 0x0, 0x80000000, 0x0) ptrace$cont(0x9, r1, 0x7, 0x7) r2 = getpgid(r1) ptrace$setsig(0x4203, r2, 0x3, &(0x7f0000000000)={0x36, 0x4, 0x53d}) [ 2065.070697] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2065.103627] FAULT_INJECTION: forcing a failure. [ 2065.103627] name failslab, interval 1, probability 0, space 0, times 0 [ 2065.106408] CPU: 1 PID: 108588 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2065.107901] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2065.109713] Call Trace: [ 2065.110291] dump_stack+0x107/0x167 [ 2065.111084] should_fail.cold+0x5/0xa [ 2065.111936] ? create_object.isra.0+0x3a/0xa20 [ 2065.112941] should_failslab+0x5/0x20 [ 2065.113765] kmem_cache_alloc+0x5b/0x360 [ 2065.114647] create_object.isra.0+0x3a/0xa20 [ 2065.115621] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2065.116755] kmem_cache_alloc+0x159/0x360 [ 2065.117710] ? trace_hardirqs_on+0x5b/0x180 [ 2065.118643] __d_alloc+0x2a/0x990 [ 2065.119364] d_alloc_pseudo+0x19/0x70 [ 2065.120163] alloc_file_pseudo+0xce/0x250 [ 2065.121028] ? alloc_file+0x5a0/0x5a0 [ 2065.121833] ? shmem_get_inode+0x55c/0xbc0 [ 2065.122749] __shmem_file_setup+0x144/0x320 [ 2065.123684] ? _copy_from_user+0xfb/0x1b0 [ 2065.124616] __do_sys_memfd_create+0x275/0x450 [ 2065.125641] ? memfd_file_seals_ptr+0x170/0x170 [ 2065.126671] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2065.127816] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2065.128888] do_syscall_64+0x33/0x40 [ 2065.129736] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2065.130841] RIP: 0033:0x7ffb28734b19 [ 2065.131604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2065.135527] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2065.137231] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2065.138753] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2065.140180] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2065.141617] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2065.143107] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2065.146395] EXT4-fs (loop7): unsupported inode size: 0 [ 2065.148102] EXT4-fs (loop7): blocksize: 2048 [ 2065.203427] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2065.211072] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2065.213760] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2065.225527] EXT4-fs (loop1): get root inode failed [ 2065.226761] EXT4-fs (loop1): mount failed 12:44:25 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x1f, 0x1) 12:44:25 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:25 executing program 4: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) r4 = fork() getpgid(r4) [ 2080.570331] FAULT_INJECTION: forcing a failure. [ 2080.570331] name failslab, interval 1, probability 0, space 0, times 0 [ 2080.572109] CPU: 0 PID: 108926 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2080.573162] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2080.574436] Call Trace: [ 2080.574855] dump_stack+0x107/0x167 [ 2080.575425] should_fail.cold+0x5/0xa [ 2080.576017] ? __alloc_file+0x21/0x320 [ 2080.576619] should_failslab+0x5/0x20 [ 2080.577214] kmem_cache_alloc+0x5b/0x360 [ 2080.577851] __alloc_file+0x21/0x320 [ 2080.578415] alloc_empty_file+0x6d/0x170 [ 2080.579036] alloc_file+0x59/0x5a0 [ 2080.579581] alloc_file_pseudo+0x16a/0x250 [ 2080.580220] ? alloc_file+0x5a0/0x5a0 [ 2080.580807] ? shmem_get_inode+0x55c/0xbc0 [ 2080.581477] __shmem_file_setup+0x144/0x320 [ 2080.582134] ? _copy_from_user+0xfb/0x1b0 [ 2080.582770] __do_sys_memfd_create+0x275/0x450 [ 2080.583467] ? memfd_file_seals_ptr+0x170/0x170 [ 2080.584223] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2080.585077] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2080.585919] do_syscall_64+0x33/0x40 [ 2080.586524] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2080.587358] RIP: 0033:0x7ffb28734b19 [ 2080.587958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2080.590965] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2080.592206] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2080.593372] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2080.594544] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2080.595705] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2080.596876] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:44:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:44:25 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 10) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:25 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:25 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() r4 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x5000) shmdt(r4) shmdt(r4) syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:44:25 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = getpid() ioprio_get$pid(0x3, r0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd, 0x0, 0x3}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r2 = dup2(0xffffffffffffffff, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00cdc99d9a6b38dc25da39f8d0fb9f65c5f36fb93cae04651461f32beb08586a206fd087c0bdb34d46e1d62619c25414813a0fe7ae3ba04bd9e3b0e7762605f2b76a391c85bca3621ac47957cb33a85a594cb3486e67cbc09f1884c29899075e3033765ac8dda95eda0f5ade92c06bf21e806bcbb7c158c1ebd5f0921f28601d"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0xa, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f000004d440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d640)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x20, "597ff2e214f3f6"}) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r2, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2080.643753] EXT4-fs (loop7): unsupported inode size: 0 [ 2080.644867] EXT4-fs (loop7): blocksize: 2048 [ 2080.648437] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2080.683932] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2080.687379] EXT4-fs (loop1): get root inode failed [ 2080.688713] EXT4-fs (loop1): mount failed 12:44:25 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 11) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x2}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2080.849773] FAULT_INJECTION: forcing a failure. [ 2080.849773] name failslab, interval 1, probability 0, space 0, times 0 [ 2080.852497] CPU: 0 PID: 109516 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2080.853942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2080.855618] Call Trace: [ 2080.856166] dump_stack+0x107/0x167 [ 2080.856906] should_fail.cold+0x5/0xa [ 2080.857690] ? create_object.isra.0+0x3a/0xa20 [ 2080.858617] should_failslab+0x5/0x20 [ 2080.859392] kmem_cache_alloc+0x5b/0x360 [ 2080.860217] create_object.isra.0+0x3a/0xa20 [ 2080.861112] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2080.862149] kmem_cache_alloc+0x159/0x360 [ 2080.862996] __alloc_file+0x21/0x320 [ 2080.863753] alloc_empty_file+0x6d/0x170 [ 2080.864582] alloc_file+0x59/0x5a0 [ 2080.865317] alloc_file_pseudo+0x16a/0x250 [ 2080.866171] ? alloc_file+0x5a0/0x5a0 [ 2080.866938] ? shmem_get_inode+0x55c/0xbc0 [ 2080.867788] __shmem_file_setup+0x144/0x320 [ 2080.868656] ? _copy_from_user+0xfb/0x1b0 [ 2080.869493] __do_sys_memfd_create+0x275/0x450 [ 2080.870400] ? memfd_file_seals_ptr+0x170/0x170 [ 2080.871327] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 12:44:26 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2080.872369] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2080.873545] do_syscall_64+0x33/0x40 [ 2080.874295] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2080.875327] RIP: 0033:0x7ffb28734b19 [ 2080.876082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2080.879797] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2080.881335] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2080.882770] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2080.884205] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2080.885649] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2080.887081] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:44:26 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:26 executing program 0: r0 = fork() ptrace(0x10, r0) r1 = getpid() ioprio_get$pid(0x3, r1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r2, &(0x7f0000000580)=[{{&(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000600)="5802dc", 0x3}, {0x0}, {&(0x7f0000000340)='3', 0x1}], 0x3, &(0x7f0000000500)=[@ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}], 0x38}}], 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0xfffffffffffffffe}, 0x0, 0x3, 0xffffffffffffffff, 0x8) semop(0x0, &(0x7f0000000000)=[{0x0, 0x6}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000040), 0x8, 0x111800) ptrace$setregs(0xffffffffffffffff, r1, 0x7fffffff, &(0x7f0000000000)="900a92c6863e8a5683472192926d16641e1d27a4203d41f62df9d3d4d8bd5aabfe7fe6c027c7bf67ddfc7860fe6e0ee13f81af8cd546c4140336e855028e5ac4ae57ba506de27ea2cbaefada29e35fb8f560c201b06d031d75f321dd8c25e52f5a43d1871e2f7fe51a26b88886b11c4fe953559594109af44c8eb94519c83a69f1e68183e565ffae82580adad131a07eae0e08149aa791d70aaee4c97c82c070c527df2bb16a8d1d89312289fe2c5459e5e25e9638b5e4fc9010") r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/ehci_hcd', 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000100)) r4 = getpid() ioprio_get$pid(0x3, r4) pidfd_open(r4, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x7, 0x7) [ 2080.961528] EXT4-fs (loop7): unsupported inode size: 0 [ 2080.963111] EXT4-fs (loop7): blocksize: 2048 12:44:26 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x40000000, &(0x7f00000003c0)) 12:44:26 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:26 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0xff, r2, &(0x7f00000001c0)="71ab228a2f6eb81a7f7a6548086c79c2785de7d37a143caf2757611978cadd0117c5ba982cbeca7e2c4b71cc359f2eb73bcb1aad240620cd37e279131c5fab78c2273cd1453649ea19766755839d6b69adeec6971ec579c9e3f3a4c09cd6a6a7f037376fdbc95c6f6475359e95ae18ba7ed335e311a62483c7b40c63e200b2fa8feaf3abe099dfe34e68fb478687f66a687cc562b23b4e1bb4cc193158a3e07da324c39bd23c16edb4a38a262ee48458c4dc90d8d53c0ffaaf63a3d1b774d05bb57f0952820009984671d1397fd965f7b9fec132c936b01e29f892526c6bf17e067462133c0c0c0cb2a800d7050759490d2fa6cde4fb", 0xf6, 0x6, 0x0, 0x2, r1}, &(0x7f00000002c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="5417fa5357f9c02b7b9eedf0569980"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2081.077260] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2081.082347] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2081.083525] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2081.097451] EXT4-fs (loop1): get root inode failed [ 2081.098517] EXT4-fs (loop1): mount failed [ 2081.134271] EXT4-fs (loop3): Unrecognized mount option "TúSWùÀ+{žíðV™€" or missing value 12:44:26 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:26 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 12) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2081.187747] EXT4-fs (loop4): unsupported inode size: 0 [ 2081.189205] EXT4-fs (loop4): blocksize: 2048 [ 2081.302532] FAULT_INJECTION: forcing a failure. [ 2081.302532] name failslab, interval 1, probability 0, space 0, times 0 [ 2081.305198] CPU: 0 PID: 110118 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2081.306624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2081.308304] Call Trace: [ 2081.308848] dump_stack+0x107/0x167 [ 2081.309591] should_fail.cold+0x5/0xa [ 2081.310364] ? security_file_alloc+0x34/0x170 [ 2081.311271] should_failslab+0x5/0x20 [ 2081.312041] kmem_cache_alloc+0x5b/0x360 [ 2081.312865] security_file_alloc+0x34/0x170 [ 2081.313757] __alloc_file+0xb6/0x320 [ 2081.314515] alloc_empty_file+0x6d/0x170 [ 2081.315338] alloc_file+0x59/0x5a0 [ 2081.316064] alloc_file_pseudo+0x16a/0x250 [ 2081.316923] ? alloc_file+0x5a0/0x5a0 [ 2081.317708] ? shmem_get_inode+0x55c/0xbc0 [ 2081.318573] __shmem_file_setup+0x144/0x320 [ 2081.319443] ? _copy_from_user+0xfb/0x1b0 [ 2081.320289] __do_sys_memfd_create+0x275/0x450 [ 2081.321212] ? memfd_file_seals_ptr+0x170/0x170 [ 2081.322173] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2081.323233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2081.324276] do_syscall_64+0x33/0x40 [ 2081.325028] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2081.326067] RIP: 0033:0x7ffb28734b19 [ 2081.326819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2081.330526] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2081.332056] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2081.333507] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2081.334948] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2081.336382] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2081.337828] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2081.372187] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 12:44:38 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 13) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:38 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) write$P9_RREADLINK(r1, &(0x7f0000000140)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) socket$inet(0x2, 0xa, 0x3) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x288000, 0x48, 0x10}, 0x18) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000280)={0x22, 0x31, 0xd, 0x1a, 0x5, 0x2661, 0x4, 0x111, 0x1}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:38 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:38 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) signalfd4(r2, &(0x7f00000002c0)={[0x7]}, 0x8, 0x800) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r3 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ffa000/0x4000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() syz_open_procfs(r4, &(0x7f0000000040)='io\x00') ptrace$setopts(0x4206, r0, 0x400, 0x20) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r4, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:44:38 executing program 0: r0 = fork() ptrace(0x10, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ptrace(0x11, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x9, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xa, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, "d1e3092eb94018fff573e4cfd2821799ea8563bd475102d18fe15fe2967de4e944721a6b45d580e0fcbc9405653f2d27857f300011e33cd1799fbb2952bb6f8fdd3d3fb79348bd9e7f136d4c15eea87a"}, 0xd8) r4 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='./binderfs2/binder-control\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4, {0x7, 0x3f}}, './file0\x00'}) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e23, 0x4, @rand_addr=' \x01\x00', 0x2}, 0x1c) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) waitid(0x0, r6, &(0x7f0000000040), 0x4, 0x0) 12:44:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x3}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:44:38 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:38 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2093.122824] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2093.126416] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2093.128416] FAULT_INJECTION: forcing a failure. [ 2093.128416] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.128581] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 2093.130816] CPU: 1 PID: 110216 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2093.132796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2093.134487] Call Trace: [ 2093.135026] dump_stack+0x107/0x167 [ 2093.135763] should_fail.cold+0x5/0xa [ 2093.136533] ? create_object.isra.0+0x3a/0xa20 [ 2093.137475] should_failslab+0x5/0x20 [ 2093.138245] kmem_cache_alloc+0x5b/0x360 [ 2093.139063] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2093.140170] create_object.isra.0+0x3a/0xa20 [ 2093.141056] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2093.142092] kmem_cache_alloc+0x159/0x360 [ 2093.142936] security_file_alloc+0x34/0x170 [ 2093.143815] __alloc_file+0xb6/0x320 [ 2093.144584] alloc_empty_file+0x6d/0x170 [ 2093.145415] alloc_file+0x59/0x5a0 [ 2093.146154] alloc_file_pseudo+0x16a/0x250 [ 2093.147017] ? alloc_file+0x5a0/0x5a0 [ 2093.147805] ? shmem_get_inode+0x55c/0xbc0 [ 2093.148678] __shmem_file_setup+0x144/0x320 [ 2093.149575] ? _copy_from_user+0xfb/0x1b0 [ 2093.150421] __do_sys_memfd_create+0x275/0x450 [ 2093.151363] ? memfd_file_seals_ptr+0x170/0x170 [ 2093.152320] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2093.153392] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2093.154457] do_syscall_64+0x33/0x40 [ 2093.155224] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2093.156272] RIP: 0033:0x7ffb28734b19 [ 2093.157040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2093.160805] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2093.162366] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007ffb28734b19 [ 2093.163816] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007ffb2878e0fb [ 2093.165276] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2093.166748] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2093.168219] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 [ 2093.191704] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2093.198703] EXT4-fs (loop1): get root inode failed [ 2093.200027] EXT4-fs (loop1): mount failed [ 2093.213738] EXT4-fs (loop4): unsupported inode size: 0 [ 2093.214436] EXT4-fs (loop4): blocksize: 2048 12:44:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x4}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2093.360388] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2093.375600] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:44:51 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x5}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:44:51 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:51 executing program 6: r0 = fork() ptrace(0x10, r0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x9}, 0x40108}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r2, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() syz_open_procfs(r4, &(0x7f0000000040)='io\x00') stat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffffff, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r5, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r5, r1, r1], 0x6) waitid(0x1, r4, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) ptrace(0x4208, 0xffffffffffffffff) 12:44:51 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0xa03e56051dc8b287, r0, &(0x7f00000000c0), 0x8, &(0x7f0000000140)) ptrace(0x10, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpgrp(r0) ptrace$setsig(0x4203, r1, 0xfffffffeffffffff, &(0x7f0000000040)={0x32, 0x9, 0x3f}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$cont(0x20, r2, 0x5, 0x7) 12:44:51 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000000000000100000001000000004000000000000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001785841f4b3e42250261cc351b274b00dd3a10316adfb98f62172fd92a3d36f6db648f86828d43fb2c6f1ff5f3bb6971bc289672119ce0ea3a687ade1690ad39483478501bca5be35f03f3ff9b7bec38d911df4549e52af237626a5cfec8ae74dc6074f0f4c6b30eb2b2929417897d760fdb4", 0xcc, 0x6000000000}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:51 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:51 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 14) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2106.538652] FAULT_INJECTION: forcing a failure. [ 2106.538652] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2106.541678] CPU: 0 PID: 110953 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2106.543134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2106.544865] Call Trace: [ 2106.545435] dump_stack+0x107/0x167 [ 2106.546210] should_fail.cold+0x5/0xa [ 2106.547047] __alloc_pages_nodemask+0x182/0x680 [ 2106.548056] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2106.549329] ? lock_downgrade+0x6d0/0x6d0 [ 2106.550202] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2106.550260] alloc_pages_vma+0xbb/0x410 [ 2106.552001] shmem_alloc_page+0x10f/0x1e0 [ 2106.552889] ? shmem_init_inode+0x20/0x20 [ 2106.553809] ? percpu_counter_add_batch+0x8b/0x140 [ 2106.554855] ? __vm_enough_memory+0x184/0x360 [ 2106.555797] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 2106.556937] ? shmem_unuse_inode+0xed0/0xed0 [ 2106.557867] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2106.558946] shmem_write_begin+0xf7/0x1d0 [ 2106.559824] generic_perform_write+0x20a/0x4f0 [ 2106.560806] ? __mnt_drop_write_file+0x9/0x70 [ 2106.561786] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2106.563310] ? evict_inodes+0x420/0x420 [ 2106.564170] ? generic_write_checks+0x2ad/0x390 [ 2106.565168] __generic_file_write_iter+0x39d/0x5d0 [ 2106.566235] generic_file_write_iter+0xdb/0x230 [ 2106.567221] ? iov_iter_init+0x3c/0x130 [ 2106.568067] new_sync_write+0x42c/0x660 [ 2106.568897] ? new_sync_read+0x6f0/0x6f0 [ 2106.569769] ? __x64_sys_pwrite64+0x201/0x260 [ 2106.570723] ? lock_release+0x6b0/0x6b0 [ 2106.571555] ? selinux_file_permission+0x36/0x510 [ 2106.572588] vfs_write+0x747/0xa30 [ 2106.573355] __x64_sys_pwrite64+0x201/0x260 [ 2106.574308] ? vfs_write+0xa30/0xa30 [ 2106.575142] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2106.576239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2106.577331] do_syscall_64+0x33/0x40 [ 2106.578146] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2106.579267] RIP: 0033:0x7ffb286e7ab7 [ 2106.580053] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2106.583936] RSP: 002b:00007ffb25ca9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2106.585504] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7ab7 [ 2106.586975] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000005 [ 2106.588433] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2106.589904] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 2106.591358] R13: 0000000000000005 R14: 0000000020000440 R15: 0000000000000000 [ 2106.619113] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated 12:44:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x6}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2106.630355] EXT4-fs (loop4): unsupported inode size: 0 [ 2106.631488] EXT4-fs (loop4): blocksize: 2048 [ 2106.632954] EXT4-fs (loop1): get root inode failed [ 2106.634221] EXT4-fs (loop1): mount failed [ 2106.688584] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 12:44:51 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:51 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="de"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) r2 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x300000a, r2) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2106.760636] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 12:44:51 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:52 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 15) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2106.852457] FAULT_INJECTION: forcing a failure. [ 2106.852457] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2106.854578] CPU: 1 PID: 111585 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2106.855647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2106.856915] Call Trace: [ 2106.857324] dump_stack+0x107/0x167 [ 2106.857914] should_fail.cold+0x5/0xa [ 2106.858503] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2106.859299] iov_iter_copy_from_user_atomic+0x49b/0xc60 [ 2106.860128] ? shmem_write_begin+0xf7/0x1d0 [ 2106.860807] ? shmem_write_begin+0x100/0x1d0 [ 2106.861498] generic_perform_write+0x279/0x4f0 [ 2106.862228] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2106.863342] ? evict_inodes+0x420/0x420 [ 2106.863966] ? generic_write_checks+0x2ad/0x390 [ 2106.864674] __generic_file_write_iter+0x39d/0x5d0 [ 2106.865435] generic_file_write_iter+0xdb/0x230 [ 2106.866161] ? iov_iter_init+0x3c/0x130 [ 2106.866771] new_sync_write+0x42c/0x660 [ 2106.867380] ? new_sync_read+0x6f0/0x6f0 [ 2106.868002] ? __x64_sys_pwrite64+0x201/0x260 [ 2106.868704] ? lock_release+0x6b0/0x6b0 [ 2106.869322] ? selinux_file_permission+0x36/0x510 [ 2106.870116] vfs_write+0x747/0xa30 [ 2106.870664] __x64_sys_pwrite64+0x201/0x260 [ 2106.871342] ? vfs_write+0xa30/0xa30 [ 2106.871921] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2106.872728] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2106.873535] do_syscall_64+0x33/0x40 [ 2106.874127] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2106.874943] RIP: 0033:0x7ffb286e7ab7 [ 2106.875516] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2106.878437] RSP: 002b:00007ffb25ca9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2106.879623] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7ab7 [ 2106.880711] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000005 [ 2106.881826] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2106.882915] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 2106.883993] R13: 0000000000000005 R14: 0000000020000440 R15: 0000000000000000 [ 2106.923287] EXT4-fs (loop3): Unrecognized mount option "Þ" or missing value 12:44:52 executing program 4: r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000540)=0x0) syz_io_uring_submit(0x0, r1, 0x0, 0x80) syz_io_uring_setup(0x5666, &(0x7f0000000140)={0x0, 0xbfc2, 0x0, 0x3, 0x20ac8561, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000280)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x21) fallocate(r2, 0x0, 0x0, 0x8800000) syz_io_uring_setup(0x2585, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r3 = socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000fbffffffffffffff000003"], 0x28}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f00000000c0)='./file1\x00') syz_genetlink_get_family_id$team(&(0x7f0000000080), r3) 12:44:52 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2106.958168] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2106.961999] EXT4-fs (loop1): get root inode failed [ 2106.963186] EXT4-fs (loop1): mount failed 12:44:52 executing program 6: r0 = fork() ptrace(0x10, r0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r2, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() syz_open_procfs(r4, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r4, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) r5 = signalfd4(r1, &(0x7f00000006c0), 0x8, 0x80000) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x2, 0x3, 0x20, 0xa5, 0x0, 0x100000000, 0x800, 0x5, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0xffffffffffff8000, 0x9}, 0x0, 0x6, 0x1, 0x2, 0xdf, 0x6, 0x6, 0x0, 0x2, 0x0, 0x7c8}, r4, 0x9, r5, 0x0) 12:44:52 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) fork() ptrace$cont(0x9, r0, 0x7, 0x7) 12:44:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x7}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:44:52 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:44:52 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00f3f79bb55ebc8fb82368cfec4d1c000000"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:44:52 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="de"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) r2 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x300000a, r2) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2107.205810] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2107.209823] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2107.268681] EXT4-fs (loop4): Unrecognized mount option "Þ" or missing value [ 2107.321760] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:45:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x9}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:45:05 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000140)={0x25, 0x19, 0xd, 0xb, 0xa, 0x2, 0x1, 0x22, 0x1}) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x280, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000200)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x7}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="d439170f50a3296c02ffafa60400"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:05 executing program 4: keyctl$session_to_parent(0x12) r0 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r0}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, 0x989680}}, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7a}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xffffffbc}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) 12:45:05 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:05 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, r0, &(0x7f0000000000), 0x20000000, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x101, 0x0) 12:45:05 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 16) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:05 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() ptrace$pokeuser(0x6, 0x0, 0xff78, 0x9) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:45:05 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2120.451814] FAULT_INJECTION: forcing a failure. [ 2120.451814] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2120.454598] CPU: 0 PID: 112323 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2120.456043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2120.457742] Call Trace: [ 2120.458302] dump_stack+0x107/0x167 [ 2120.459056] should_fail.cold+0x5/0xa [ 2120.459848] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2120.460898] iov_iter_copy_from_user_atomic+0x49b/0xc60 [ 2120.462027] ? shmem_write_begin+0xf7/0x1d0 [ 2120.462917] ? shmem_write_begin+0x100/0x1d0 [ 2120.463839] generic_perform_write+0x279/0x4f0 [ 2120.464807] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2120.466315] ? evict_inodes+0x420/0x420 [ 2120.467140] ? generic_write_checks+0x2ad/0x390 [ 2120.468110] __generic_file_write_iter+0x39d/0x5d0 [ 2120.469130] generic_file_write_iter+0xdb/0x230 [ 2120.470109] ? iov_iter_init+0x3c/0x130 [ 2120.470935] new_sync_write+0x42c/0x660 [ 2120.471758] ? new_sync_read+0x6f0/0x6f0 [ 2120.472596] ? __x64_sys_pwrite64+0x201/0x260 [ 2120.473525] ? lock_release+0x6b0/0x6b0 [ 2120.474358] ? selinux_file_permission+0x36/0x510 [ 2120.475367] vfs_write+0x747/0xa30 [ 2120.476104] __x64_sys_pwrite64+0x201/0x260 [ 2120.476987] ? vfs_write+0xa30/0xa30 [ 2120.477752] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2120.478840] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2120.479896] do_syscall_64+0x33/0x40 [ 2120.480661] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2120.481705] RIP: 0033:0x7ffb286e7ab7 [ 2120.482476] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2120.486273] RSP: 002b:00007ffb25ca9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2120.487834] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7ab7 [ 2120.489280] RDX: 0000000000000092 RSI: 00000000200001c0 RDI: 0000000000000005 [ 2120.490728] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2120.492166] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000005 [ 2120.493608] R13: 0000000000000005 R14: 0000000020000458 R15: 0000000000000001 [ 2120.590293] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2120.593781] EXT4-fs (loop1): get root inode failed [ 2120.595021] EXT4-fs (loop1): mount failed 12:45:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0xf}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:45:05 executing program 0: r0 = fork() ptrace(0x10, r0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x10, 0x2, 0x7, 0x1, 0xfff, 0x0, 0x5, 0x8}, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) ptrace$cont(0x7, r0, 0x5, 0x5) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x7f, 0x6, 0x9, 0x5, 0x0, 0x3, 0x880, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0xc8dacb32dbbc0e52, 0xfffffffffffffff9, 0x5, 0x7, 0x2, 0xce, 0x1, 0x0, 0x8000, 0x0, 0x9}, r0, 0x4, 0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) ptrace$cont(0x18, r1, 0x3, 0x274000000000000) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x7, 0x42, 0x80, 0x8, 0x5, 0x6, 0x9, 0x9, 0x3}, 0x0) [ 2120.687699] EXT4-fs (loop3): Unrecognized mount option "Ô9P£)lÿ¯¦" or missing value 12:45:05 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) socket$unix(0x1, 0x1, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:05 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2120.785537] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2120.794818] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:45:06 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:45:06 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() stat(&(0x7f00000006c0)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) setresuid(r4, 0xee01, 0xffffffffffffffff) syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffffff, &(0x7f0000001680)='./file0\x00', 0x6000, 0x7ff, &(0x7f0000000700)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, 0x0, &(0x7f0000000240), 0x40000000, &(0x7f0000000800)) 12:45:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x28, r1, 0xb0b, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x402cbd772a332123}]}]}]}, 0x28}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000089}, 0x800) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x100001000a00}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="6572720300735bce301d74696e75652c00"]) 12:45:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2120.876897] FAT-fs (loop4): Unrecognized mount option "err" or missing value 12:45:06 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 17) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2120.993681] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2121.003571] EXT4-fs (loop1): get root inode failed [ 2121.004802] EXT4-fs (loop1): mount failed [ 2121.011521] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2121.036426] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2121.053324] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2121.128317] FAULT_INJECTION: forcing a failure. [ 2121.128317] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2121.131151] CPU: 1 PID: 113545 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2121.132602] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2121.134327] Call Trace: [ 2121.134879] dump_stack+0x107/0x167 [ 2121.135634] should_fail.cold+0x5/0xa [ 2121.136423] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2121.137466] iov_iter_copy_from_user_atomic+0x49b/0xc60 [ 2121.138583] ? shmem_write_begin+0xf7/0x1d0 [ 2121.139470] ? shmem_write_begin+0x100/0x1d0 [ 2121.140386] generic_perform_write+0x279/0x4f0 [ 2121.141347] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2121.142854] ? evict_inodes+0x420/0x420 [ 2121.143676] ? generic_write_checks+0x2ad/0x390 [ 2121.144651] __generic_file_write_iter+0x39d/0x5d0 [ 2121.145669] generic_file_write_iter+0xdb/0x230 [ 2121.146642] ? iov_iter_init+0x3c/0x130 [ 2121.147470] new_sync_write+0x42c/0x660 [ 2121.148293] ? new_sync_read+0x6f0/0x6f0 [ 2121.149132] ? __x64_sys_pwrite64+0x201/0x260 [ 2121.150073] ? lock_release+0x6b0/0x6b0 [ 2121.150896] ? selinux_file_permission+0x36/0x510 [ 2121.151908] vfs_write+0x747/0xa30 [ 2121.152648] __x64_sys_pwrite64+0x201/0x260 [ 2121.153537] ? vfs_write+0xa30/0xa30 [ 2121.154315] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2121.155394] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2121.156459] do_syscall_64+0x33/0x40 [ 2121.157228] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2121.158300] RIP: 0033:0x7ffb286e7ab7 [ 2121.159068] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2121.162856] RSP: 002b:00007ffb25ca9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2121.164427] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7ab7 [ 2121.165903] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000005 [ 2121.167372] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2121.168840] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000005 [ 2121.170313] R13: 0000000000000005 R14: 0000000020000488 R15: 0000000000000003 [ 2121.303848] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2121.307836] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:45:19 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 18) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r0, 0x0, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000000)) r1 = fork() ptrace(0x10, r1) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r1, 0x7, 0x7) 12:45:19 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000140)={0x3c, 0x1d, 0xa, 0x1a, 0x3, 0x5c1, 0x1, 0x168, 0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:19 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:45:19 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b", 0x55, 0x1000}], 0x2c00402, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x100, 0x10) syz_mount_image$nfs4(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x6, 0x2, &(0x7f0000000480)=[{&(0x7f00000002c0)="84a0bd18d40e96bd7e5a3d63f1510f2178d479162e2604e5d4f50aa1009158bcba5e063453cb94ffc3bb41cae1162f1835fe8f93d81df7d3b137a8ecf178a9881adfd2f2de2ab22ca5074581c9639c69551d54713b2645edd4b5bd547517aa83ddcb76a6dbf5ec866e6d0185f2f368df9f7fcf3ea201dbc789e49f485df91e901edecb430d440cff5b7482dad336c9e14a6cff4bebe7dd817fd541d50d8a9725ad68e0c111cce19061ef01e7ac94d474bcc5333fa004b439ca2aff33c73b83efc05b7356ebe952f4c2524d7a79dbcd2e7e", 0xd1, 0x6}, {&(0x7f00000003c0)="4bdf505713cab5096e207528e12ecaa7f3da75a3510f37f296e6306eec8cb7fcc1fb85b99ac17e0031123537c9dd902ce7c5b061484d8b59b668b79d40ac81fbc753ae30c06b78b2f1e4fd26288f1f4342d355844c878d98d7a68139cd6eab627d971ae5b6bf3fe058a691246b313aef3b2bd1286ef83a099be6a3d499f1c5d4ff50dea5f19fbb695774bee9ab3ef61a97ccb166ac7dddf52758ba440f08912ad16ea6b9", 0xa4, 0x3}], 0x986806, &(0x7f00000004c0)={[{']:\\!{'}, {}, {'(!%'}, {'({})}'}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@fowner_gt}, {@fsname={'fsname', 0x3d, 'batadv_slave_0\x00'}}, {@dont_hash}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/full\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/full\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@measure}]}) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000040)=0x81, 0xffffffffffffffb3) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000140)=0x7fff) 12:45:19 executing program 6: r0 = fork() ptrace(0x10, r0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xc61}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r2, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r3, 0x406, r1) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r4 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r4, &(0x7f0000ffd000/0x1000)=nil, 0x4000) r5 = fork() syz_open_procfs(r5, &(0x7f0000000040)='io\x00') pidfd_open(r0, 0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x6000, 0x4, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x2, r5, &(0x7f0000000240), 0x2, &(0x7f00000003c0)) 12:45:19 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x2}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2134.237749] FAULT_INJECTION: forcing a failure. [ 2134.237749] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2134.239261] CPU: 0 PID: 113696 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2134.239969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2134.240803] Call Trace: [ 2134.241075] dump_stack+0x107/0x167 [ 2134.241443] should_fail.cold+0x5/0xa [ 2134.241843] __alloc_pages_nodemask+0x182/0x680 [ 2134.242328] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2134.242942] ? lock_downgrade+0x6d0/0x6d0 [ 2134.243373] alloc_pages_vma+0xbb/0x410 [ 2134.243784] shmem_alloc_page+0x10f/0x1e0 [ 2134.244202] ? shmem_init_inode+0x20/0x20 [ 2134.244635] ? percpu_counter_add_batch+0x8b/0x140 [ 2134.245136] ? __vm_enough_memory+0x184/0x360 [ 2134.245588] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 2134.246138] ? shmem_unuse_inode+0xed0/0xed0 [ 2134.246584] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2134.247102] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2134.247611] shmem_write_begin+0xf7/0x1d0 [ 2134.248036] generic_perform_write+0x20a/0x4f0 [ 2134.248508] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2134.249264] ? evict_inodes+0x420/0x420 [ 2134.249690] ? generic_write_checks+0x2ad/0x390 [ 2134.250204] __generic_file_write_iter+0x39d/0x5d0 [ 2134.250728] generic_file_write_iter+0xdb/0x230 [ 2134.251214] ? iov_iter_init+0x3c/0x130 [ 2134.251638] new_sync_write+0x42c/0x660 [ 2134.252055] ? new_sync_read+0x6f0/0x6f0 [ 2134.252485] ? __x64_sys_pwrite64+0x201/0x260 [ 2134.252961] ? lock_release+0x6b0/0x6b0 [ 2134.253383] ? selinux_file_permission+0x36/0x510 [ 2134.253896] vfs_write+0x747/0xa30 [ 2134.254280] __x64_sys_pwrite64+0x201/0x260 [ 2134.254731] ? vfs_write+0xa30/0xa30 [ 2134.255129] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2134.255678] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2134.256218] do_syscall_64+0x33/0x40 [ 2134.256613] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2134.257147] RIP: 0033:0x7ffb286e7ab7 [ 2134.257545] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2134.259478] RSP: 002b:00007ffb25ca9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2134.260285] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7ab7 [ 2134.261051] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 2134.261813] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2134.262579] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 2134.263343] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 2134.315178] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2134.344828] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2134.349780] EXT4-fs (loop1): get root inode failed [ 2134.350960] EXT4-fs (loop1): mount failed 12:45:19 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2134.403446] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 12:45:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x3}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2134.423786] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:45:19 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) 12:45:19 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) process_vm_readv(r3, &(0x7f00000002c0)=[{&(0x7f00000006c0)=""/156, 0x9c}], 0x1, &(0x7f00000008c0)=[{&(0x7f0000000780)=""/117, 0x75}, {&(0x7f0000000300)=""/22, 0x16}, {&(0x7f0000000800)=""/162, 0xa2}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x4, 0x0) [ 2134.478962] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated 12:45:19 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000180)={0x4, 0x9, 0x7, 0x1e, 0x0, 0x10000, 0x0, 0x84, 0xffffffffffffffff}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000001c0)="ed21e8c6505f8198caf783974627d94f52009446f46552e0f4655fe0f4655f000000000000040004", 0x28, 0x20000020ff}], 0x0, &(0x7f0000000140)={[], [{@audit}, {@dont_hash}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000200)={0x28, 0x5, 0x3, 0xc, 0x8, 0x9, 0x3, 0x69, 0xffffffffffffffff}) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2134.485207] EXT4-fs (loop2): get root inode failed [ 2134.486763] EXT4-fs (loop2): mount failed [ 2134.560757] EXT4-fs (loop3): Unrecognized mount option "audit" or missing value 12:45:19 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:19 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2134.612290] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 12:45:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x4}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2134.647822] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:45:19 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 19) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2134.688727] FAULT_INJECTION: forcing a failure. [ 2134.688727] name failslab, interval 1, probability 0, space 0, times 0 [ 2134.690080] CPU: 0 PID: 114737 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2134.690804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2134.691634] Call Trace: [ 2134.691912] dump_stack+0x107/0x167 [ 2134.692282] should_fail.cold+0x5/0xa [ 2134.692671] ? xas_alloc+0x336/0x440 [ 2134.693050] should_failslab+0x5/0x20 [ 2134.693437] kmem_cache_alloc+0x5b/0x360 [ 2134.693848] ? trace_hardirqs_on+0x5b/0x180 [ 2134.694302] xas_alloc+0x336/0x440 [ 2134.694668] xas_create+0x60b/0x1040 [ 2134.695056] xas_create_range+0x18b/0x600 [ 2134.695483] shmem_add_to_page_cache+0x759/0x1150 [ 2134.695980] ? shmem_getattr+0x180/0x180 [ 2134.696407] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 2134.696953] ? shmem_unuse_inode+0xed0/0xed0 [ 2134.697399] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2134.697922] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2134.698442] shmem_write_begin+0xf7/0x1d0 [ 2134.698866] generic_perform_write+0x20a/0x4f0 [ 2134.699335] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2134.700104] ? evict_inodes+0x420/0x420 [ 2134.700540] ? generic_write_checks+0x2ad/0x390 [ 2134.701053] __generic_file_write_iter+0x39d/0x5d0 [ 2134.701589] generic_file_write_iter+0xdb/0x230 [ 2134.702104] ? iov_iter_init+0x3c/0x130 [ 2134.702545] new_sync_write+0x42c/0x660 [ 2134.702982] ? new_sync_read+0x6f0/0x6f0 [ 2134.703423] ? __x64_sys_pwrite64+0x201/0x260 [ 2134.703917] ? lock_release+0x6b0/0x6b0 [ 2134.704351] ? selinux_file_permission+0x36/0x510 [ 2134.704888] vfs_write+0x747/0xa30 [ 2134.705282] __x64_sys_pwrite64+0x201/0x260 [ 2134.705747] ? vfs_write+0xa30/0xa30 [ 2134.706136] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2134.706715] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2134.707281] do_syscall_64+0x33/0x40 [ 2134.707683] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2134.708235] RIP: 0033:0x7ffb286e7ab7 [ 2134.708647] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2134.710651] RSP: 002b:00007ffb25ca9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2134.711478] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7ab7 [ 2134.712198] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 2134.712980] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2134.713754] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 2134.714481] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 12:45:19 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000001c0)={0x38, 0xd, 0xb, 0x18, 0x6, 0x0, 0x6, 0x64, 0xffffffffffffffff}) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2134.782691] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2134.787789] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 2134.789222] EXT4-fs (loop1): mount failed [ 2134.797626] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:45:19 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40, 0x8001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x4, 0x5ed31490}, 0x1151, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) r4 = getpid() ioprio_get$pid(0x3, r4) process_vm_readv(r4, &(0x7f0000000780)=[{&(0x7f00000002c0)=""/101, 0x65}, {&(0x7f00000006c0)=""/128, 0x80}, {&(0x7f0000000740)=""/56, 0x38}], 0x3, &(0x7f0000000a40)=[{&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/220, 0xdc}, {&(0x7f0000000980)=""/185, 0xb9}], 0x3, 0x0) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:45:20 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) r1 = getpid() ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="020000459f8400000000002e2f66696c653000"]) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) openat(r3, &(0x7f0000000080)='./file0\x00', 0x2000, 0x11) r4 = getpid() ioprio_get$pid(0x3, r4) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000040)=r4) ptrace(0x4207, r1) 12:45:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x5}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2134.870549] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:45:20 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:20 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2134.936525] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2134.961384] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2135.030396] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 2135.031496] EXT4-fs (loop1): mount failed [ 2135.091550] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2135.095921] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:45:33 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 20) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:33 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:33 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2148.627472] FAULT_INJECTION: forcing a failure. [ 2148.627472] name failslab, interval 1, probability 0, space 0, times 0 [ 2148.630025] CPU: 1 PID: 115387 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2148.631539] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2148.633323] Call Trace: [ 2148.633905] dump_stack+0x107/0x167 [ 2148.634705] should_fail.cold+0x5/0xa [ 2148.635535] ? __memcg_kmem_charge+0x68/0x140 [ 2148.636501] ? create_object.isra.0+0x3a/0xa20 [ 2148.637498] should_failslab+0x5/0x20 12:45:33 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:45:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x8, 0xfffffffffffeffff, 0x4b3083ff, 0x8e, 0xffffffff, 0x9}) r1 = fork() ptrace(0x10, r1) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r1, 0x7, 0x7) 12:45:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x6}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:45:33 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) fdatasync(0xffffffffffffffff) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() r4 = syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f00000006c0)={0x0, 0x0}) ptrace$setsig(0x4203, r5, 0x1000, &(0x7f0000000740)={0x24, 0x9, 0xffffffff}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_SEND={0x1a, 0x4, 0x0, r4, 0x0, &(0x7f00000002c0)="b9830ba33c7a42c119d573f6cf1a808cca6e4147f70d6acd984e8889f8b8df3ad81eaba871d7cb0148be986c1b1dc700", 0x30, 0x20000040, 0x1}, 0xfffff7b8) 12:45:33 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2148.638343] kmem_cache_alloc+0x5b/0x360 [ 2148.639449] create_object.isra.0+0x3a/0xa20 [ 2148.640609] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2148.641719] kmem_cache_alloc+0x159/0x360 [ 2148.642816] ? trace_hardirqs_on+0x5b/0x180 [ 2148.643769] xas_alloc+0x336/0x440 [ 2148.644700] xas_create+0x60b/0x1040 [ 2148.645649] xas_create_range+0x18b/0x600 [ 2148.646594] shmem_add_to_page_cache+0x759/0x1150 [ 2148.647868] ? shmem_getattr+0x180/0x180 [ 2148.648781] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 2148.650201] ? shmem_unuse_inode+0xed0/0xed0 [ 2148.651165] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 2148.652510] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2148.653616] shmem_write_begin+0xf7/0x1d0 [ 2148.654715] generic_perform_write+0x20a/0x4f0 [ 2148.655736] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2148.657616] ? evict_inodes+0x420/0x420 [ 2148.658505] ? generic_write_checks+0x2ad/0x390 [ 2148.659728] __generic_file_write_iter+0x39d/0x5d0 [ 2148.660804] generic_file_write_iter+0xdb/0x230 [ 2148.662009] ? iov_iter_init+0x3c/0x130 [ 2148.662892] new_sync_write+0x42c/0x660 [ 2148.663932] ? new_sync_read+0x6f0/0x6f0 [ 2148.664817] ? __x64_sys_pwrite64+0x201/0x260 [ 2148.665986] ? lock_release+0x6b0/0x6b0 [ 2148.666860] ? selinux_file_permission+0x36/0x510 [ 2148.667949] vfs_write+0x747/0xa30 [ 2148.668723] __x64_sys_pwrite64+0x201/0x260 [ 2148.669653] ? vfs_write+0xa30/0xa30 [ 2148.670481] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2148.671612] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2148.672738] do_syscall_64+0x33/0x40 [ 2148.673542] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2148.674657] RIP: 0033:0x7ffb286e7ab7 [ 2148.675459] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2148.679440] RSP: 002b:00007ffb25ca9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2148.681070] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7ab7 [ 2148.682617] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 2148.684132] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2148.685661] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 2148.687195] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 12:45:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x7}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:45:33 executing program 0: r0 = fork() ptrace(0x10, r0) ptrace$setopts(0x4200, r0, 0x1, 0x10) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) r1 = getpid() ioprio_get$pid(0x3, r1) waitid(0x1, r1, 0x0, 0xa, &(0x7f0000000000)) [ 2148.788798] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2148.797444] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 2148.808025] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2148.818759] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2148.831314] EXT4-fs (loop3): Unrecognized mount option "&[å‡Ì" or missing value 12:45:34 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2148.880693] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2148.882598] EXT4-fs (loop1): get root inode failed [ 2148.883301] EXT4-fs (loop1): mount failed 12:45:34 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2149.016574] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 12:45:34 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2149.022692] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:45:34 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x8}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2149.077772] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2149.079730] EXT4-fs (loop1): get root inode failed [ 2149.080420] EXT4-fs (loop1): mount failed 12:45:34 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) r2 = getpid() ioprio_get$pid(0x3, r2) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x5, 0x5, 0x7, 0x9, 0x0, 0x9, 0x19926, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x200, 0x4, 0x8, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0xe157, 0x0, 0x8001}, r2, 0xa, r0, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:34 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) process_vm_readv(r4, &(0x7f0000000940)=[{&(0x7f00000006c0)=""/177, 0xb1}, {&(0x7f0000000780)=""/180, 0xb4}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000840)=""/216, 0xd8}], 0x4, &(0x7f0000000a80)=[{&(0x7f0000000980)=""/251, 0xfb}], 0x1, 0x0) syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2149.181746] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2149.186135] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2149.222392] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 2149.228098] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2149.243698] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:45:47 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:47 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 21) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:47 executing program 0: r0 = fork() ptrace(0x10, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x46e2, 0x0) open(0x0, 0x240880, 0x0) r2 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x200) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000300)='./file0\x00', r2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000540)='./file0\x00', 0x0) pwrite64(r4, &(0x7f00000000c0), 0x17, 0x10001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd2(0x0, 0x1) fchmodat(r2, &(0x7f0000000400)='./file0\x00', 0x20) chdir(&(0x7f0000000280)='./file0\x00') syz_io_uring_setup(0x4e8e, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0), 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_bp={&(0x7f00000003c0)}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r3, 0x3, 0xe3ff, 0x8000) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 12:45:47 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = fsmount(0xffffffffffffffff, 0x0, 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000140)={{r0}, 0x7, 0x4, 0x1}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r2 = dup2(0xffffffffffffffff, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r2, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:47 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:45:47 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x9}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:45:47 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) r2 = shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() syz_open_procfs(r4, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) r5 = shmat(r2, &(0x7f0000ffd000/0x3000)=nil, 0x1000) shmdt(r5) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r4, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2162.144243] FAULT_INJECTION: forcing a failure. [ 2162.144243] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2162.147152] CPU: 0 PID: 116575 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2162.148667] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2162.150474] Call Trace: [ 2162.151055] dump_stack+0x107/0x167 [ 2162.151858] should_fail.cold+0x5/0xa [ 2162.152690] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2162.153797] iov_iter_copy_from_user_atomic+0x49b/0xc60 [ 2162.154984] ? shmem_write_begin+0xf7/0x1d0 [ 2162.155921] ? shmem_write_begin+0x100/0x1d0 [ 2162.156892] generic_perform_write+0x279/0x4f0 [ 2162.157898] ? __mnt_drop_write_file+0x9/0x70 [ 2162.158886] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2162.160456] ? evict_inodes+0x420/0x420 [ 2162.161345] ? generic_write_checks+0x2ad/0x390 [ 2162.162373] __generic_file_write_iter+0x39d/0x5d0 [ 2162.163449] generic_file_write_iter+0xdb/0x230 [ 2162.164437] ? iov_iter_init+0x3c/0x130 [ 2162.165311] new_sync_write+0x42c/0x660 [ 2162.166160] ? new_sync_read+0x6f0/0x6f0 [ 2162.167060] ? __x64_sys_pwrite64+0x201/0x260 [ 2162.168049] ? lock_release+0x6b0/0x6b0 [ 2162.168928] ? selinux_file_permission+0x36/0x510 [ 2162.170003] vfs_write+0x747/0xa30 [ 2162.170799] __x64_sys_pwrite64+0x201/0x260 [ 2162.171744] ? vfs_write+0xa30/0xa30 [ 2162.172570] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2162.173715] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2162.174865] do_syscall_64+0x33/0x40 [ 2162.175687] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2162.176805] RIP: 0033:0x7ffb286e7ab7 [ 2162.177624] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2162.181638] RSP: 002b:00007ffb25ca9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2162.183313] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7ab7 [ 2162.184871] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000005 [ 2162.186460] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2162.188014] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000005 [ 2162.189576] R13: 0000000000000005 R14: 00000000200004a0 R15: 0000000000000004 [ 2162.195273] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2162.205331] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2162.211600] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2162.215226] EXT4-fs (loop1): get root inode failed [ 2162.216379] EXT4-fs (loop1): mount failed [ 2162.276470] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 2162.280801] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:45:47 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2162.431769] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2162.435803] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:45:47 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:45:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0xf}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2162.523478] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:46:00 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:00 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) wait4(r1, &(0x7f0000000240), 0x8, &(0x7f0000000280)) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r2, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() syz_open_procfs(r4, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r1, &(0x7f0000000780), 0x4, &(0x7f00000003c0)) 12:46:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0xf0}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:46:00 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:00 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x2, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x7, 0x7) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) tkill(r1, 0x26) 12:46:00 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2175.308377] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 12:46:00 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x6000, 0xa0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:00 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 22) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2175.310399] EXT4-fs (loop1): group descriptors corrupted! [ 2175.322660] FAULT_INJECTION: forcing a failure. [ 2175.322660] name failslab, interval 1, probability 0, space 0, times 0 [ 2175.325235] CPU: 0 PID: 117325 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2175.326679] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2175.328382] Call Trace: [ 2175.328936] dump_stack+0x107/0x167 [ 2175.329708] should_fail.cold+0x5/0xa [ 2175.330519] ? getname_flags.part.0+0x50/0x4f0 [ 2175.331488] should_failslab+0x5/0x20 [ 2175.332241] kmem_cache_alloc+0x5b/0x360 [ 2175.333079] getname_flags.part.0+0x50/0x4f0 [ 2175.333985] getname+0x8e/0xd0 [ 2175.334663] do_sys_openat2+0xf9/0x420 [ 2175.335463] ? build_open_flags+0x690/0x690 [ 2175.336358] ? rcu_read_lock_any_held+0x75/0xa0 [ 2175.337315] __x64_sys_openat+0x13f/0x1f0 [ 2175.338165] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2175.339171] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2175.340244] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2175.341299] do_syscall_64+0x33/0x40 [ 2175.342063] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2175.343118] RIP: 0033:0x7ffb286e7a04 [ 2175.343883] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2175.347648] RSP: 002b:00007ffb25ca9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2175.349198] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7a04 [ 2175.350660] RDX: 0000000000000002 RSI: 00007ffb25caa000 RDI: 00000000ffffff9c [ 2175.352112] RBP: 00007ffb25caa000 R08: 0000000000000000 R09: ffffffffffffffff [ 2175.353589] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2175.355049] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:46:00 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 23) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2175.482803] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2175.491671] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:46:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x300}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:46:00 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2175.591835] FAULT_INJECTION: forcing a failure. [ 2175.591835] name failslab, interval 1, probability 0, space 0, times 0 [ 2175.595231] CPU: 0 PID: 117824 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2175.596677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2175.598355] Call Trace: [ 2175.598929] dump_stack+0x107/0x167 [ 2175.599680] should_fail.cold+0x5/0xa [ 2175.600456] ? create_object.isra.0+0x3a/0xa20 [ 2175.601394] should_failslab+0x5/0x20 [ 2175.602182] kmem_cache_alloc+0x5b/0x360 [ 2175.603027] ? __generic_file_write_iter+0x1a4/0x5d0 [ 2175.604080] create_object.isra.0+0x3a/0xa20 [ 2175.604981] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2175.606024] kmem_cache_alloc+0x159/0x360 [ 2175.606903] getname_flags.part.0+0x50/0x4f0 [ 2175.607540] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2175.607807] getname+0x8e/0xd0 [ 2175.607841] do_sys_openat2+0xf9/0x420 [ 2175.610951] ? build_open_flags+0x690/0x690 [ 2175.611843] ? rcu_read_lock_any_held+0x75/0xa0 [ 2175.612797] __x64_sys_openat+0x13f/0x1f0 [ 2175.613647] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2175.614698] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2175.615556] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 2175.615879] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2175.615902] do_syscall_64+0x33/0x40 [ 2175.615923] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2175.615946] RIP: 0033:0x7ffb286e7a04 [ 2175.621571] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2175.624205] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2175.625323] RSP: 002b:00007ffb25ca9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2175.625345] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7a04 [ 2175.625357] RDX: 0000000000000002 RSI: 00007ffb25caa000 RDI: 00000000ffffff9c [ 2175.625369] RBP: 00007ffb25caa000 R08: 0000000000000000 R09: ffffffffffffffff [ 2175.625381] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2175.625402] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 2175.760375] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2175.763603] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2175.764809] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2175.782717] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:46:15 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/md_mod', 0x28100, 0x182) r2 = getpid() ioprio_get$pid(0x3, r2) sendmsg$AUDIT_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x3e9, 0x200, 0x70bd2a, 0x25dfdbfc, {0x10, 0x0, 0x0, r2, 0x40400, 0x9b, 0x5, 0x10000, 0x0, 0x8b}, ["", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x444}, 0x8080) 12:46:15 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:46:15 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:15 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:15 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x9, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="80804849fcc83e62810507a78601e41f2d213cc1561c376d7f12ca133c83c2701c18b62b60ed3dc99f507783b95b78cd119c9f00"/77]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) dup2(r1, r2) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x480}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:46:15 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 24) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:15 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r2 = fork() r3 = syz_open_procfs(r2, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(r3, &(0x7f0000001680)='./file0\x00', 0x800, 0x100, &(0x7f00000016c0)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x80000, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0xd) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) ptrace$cont(0x18, 0x0, 0x8, 0x9) waitid(0x1, r2, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2190.375916] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2190.377285] EXT4-fs (loop1): group descriptors corrupted! [ 2190.382707] EXT4-fs (loop3): Unrecognized mount option "€€HIüÈ>b§†ä-!<ÁV7mÊ<ƒÂp¶+`í=ÉŸPwƒ¹[xÍœŸ" or missing value [ 2190.386310] FAULT_INJECTION: forcing a failure. [ 2190.386310] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2190.388289] CPU: 1 PID: 118082 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2190.389280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2190.390443] Call Trace: [ 2190.390835] dump_stack+0x107/0x167 [ 2190.391347] should_fail.cold+0x5/0xa [ 2190.391888] strncpy_from_user+0x34/0x470 [ 2190.392478] getname_flags.part.0+0x95/0x4f0 [ 2190.393102] getname+0x8e/0xd0 [ 2190.393549] do_sys_openat2+0xf9/0x420 [ 2190.394101] ? build_open_flags+0x690/0x690 [ 2190.394716] ? rcu_read_lock_any_held+0x75/0xa0 [ 2190.395362] __x64_sys_openat+0x13f/0x1f0 [ 2190.395963] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2190.396654] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2190.397407] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2190.398139] do_syscall_64+0x33/0x40 [ 2190.398673] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2190.399414] RIP: 0033:0x7ffb286e7a04 [ 2190.399944] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2190.402584] RSP: 002b:00007ffb25ca9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2190.403693] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7a04 [ 2190.404715] RDX: 0000000000000002 RSI: 00007ffb25caa000 RDI: 00000000ffffff9c [ 2190.405732] RBP: 00007ffb25caa000 R08: 0000000000000000 R09: ffffffffffffffff [ 2190.406760] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2190.407775] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:46:15 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) fork() 12:46:15 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 25) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2190.492571] EXT4-fs: error -4 creating inode table initialization thread [ 2190.517760] EXT4-fs (loop4): mount failed [ 2190.540166] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 12:46:15 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:46:15 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x1, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) [ 2190.591788] FAULT_INJECTION: forcing a failure. [ 2190.591788] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.594388] CPU: 0 PID: 118666 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2190.595821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2190.597517] Call Trace: [ 2190.598058] dump_stack+0x107/0x167 [ 2190.598809] should_fail.cold+0x5/0xa [ 2190.599594] ? __alloc_file+0x21/0x320 [ 2190.600388] should_failslab+0x5/0x20 [ 2190.601170] kmem_cache_alloc+0x5b/0x360 [ 2190.602007] __alloc_file+0x21/0x320 [ 2190.602788] alloc_empty_file+0x6d/0x170 [ 2190.603617] path_openat+0xde/0x26d0 [ 2190.604387] ? path_lookupat+0x860/0x860 [ 2190.605217] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2190.606281] ? lock_acquire+0x197/0x490 [ 2190.607109] do_filp_open+0x17e/0x3d0 [ 2190.607881] ? may_open_dev+0xf0/0xf0 [ 2190.608658] ? __alloc_fd+0x2a5/0x620 [ 2190.609434] ? lock_downgrade+0x6d0/0x6d0 [ 2190.610278] ? rwlock_bug.part.0+0x90/0x90 [ 2190.611168] ? _raw_spin_unlock+0x1a/0x30 [ 2190.612018] ? __alloc_fd+0x2a5/0x620 [ 2190.612807] do_sys_openat2+0x171/0x420 [ 2190.613626] ? build_open_flags+0x690/0x690 [ 2190.614516] ? rcu_read_lock_any_held+0x75/0xa0 [ 2190.615479] __x64_sys_openat+0x13f/0x1f0 [ 2190.616327] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2190.617326] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2190.618401] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2190.619452] do_syscall_64+0x33/0x40 [ 2190.620227] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2190.621278] RIP: 0033:0x7ffb286e7a04 [ 2190.622040] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2190.625798] RSP: 002b:00007ffb25ca9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2190.627360] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7a04 [ 2190.628816] RDX: 0000000000000002 RSI: 00007ffb25caa000 RDI: 00000000ffffff9c [ 2190.630270] RBP: 00007ffb25caa000 R08: 0000000000000000 R09: ffffffffffffffff [ 2190.631733] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2190.633189] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 2190.639753] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:46:15 executing program 0: dup(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x100) fchown(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r1, 0x0, 0x0) dup(r1) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x1, 0x0) signalfd(r2, &(0x7f0000000040)={[0x1000]}, 0x3) r3 = fork() ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000080)={0x2, 0x1, 0x3, 0xf, 0x1d8, &(0x7f00000002c0)="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"}) ptrace(0x10, r3) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x1f, r3, 0x7, 0x7fff) [ 2190.661920] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2190.663074] EXT4-fs (loop1): group descriptors corrupted! 12:46:15 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() r4 = syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000002c0)=0x0) getpgrp(r5) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:46:27 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000002c0)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:46:27 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:46:27 executing program 0: r0 = fork() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000000)=r0) ptrace(0x10, r0) waitid(0x2, 0x0, 0x0, 0x8, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) 12:46:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:27 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) ioctl$RTC_WIE_OFF(r1, 0x7010) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x500}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:46:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:27 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 26) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2202.240324] FAULT_INJECTION: forcing a failure. [ 2202.240324] name failslab, interval 1, probability 0, space 0, times 0 [ 2202.243138] CPU: 1 PID: 119029 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2202.244589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2202.246266] Call Trace: [ 2202.246810] dump_stack+0x107/0x167 [ 2202.247571] should_fail.cold+0x5/0xa [ 2202.248369] ? create_object.isra.0+0x3a/0xa20 [ 2202.249294] should_failslab+0x5/0x20 [ 2202.250096] kmem_cache_alloc+0x5b/0x360 [ 2202.250930] create_object.isra.0+0x3a/0xa20 [ 2202.251836] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2202.252862] kmem_cache_alloc+0x159/0x360 [ 2202.253735] __alloc_file+0x21/0x320 [ 2202.254498] alloc_empty_file+0x6d/0x170 [ 2202.255379] path_openat+0xde/0x26d0 [ 2202.256143] ? path_lookupat+0x860/0x860 [ 2202.256996] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2202.258044] ? lock_acquire+0x197/0x490 [ 2202.258884] do_filp_open+0x17e/0x3d0 [ 2202.259652] ? may_open_dev+0xf0/0xf0 [ 2202.260445] ? __alloc_fd+0x2a5/0x620 [ 2202.261223] ? lock_downgrade+0x6d0/0x6d0 [ 2202.262084] ? rwlock_bug.part.0+0x90/0x90 [ 2202.262944] ? _raw_spin_unlock+0x1a/0x30 [ 2202.263784] ? __alloc_fd+0x2a5/0x620 [ 2202.264565] do_sys_openat2+0x171/0x420 [ 2202.265393] ? build_open_flags+0x690/0x690 [ 2202.266268] ? rcu_read_lock_any_held+0x75/0xa0 [ 2202.267255] __x64_sys_openat+0x13f/0x1f0 [ 2202.268114] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2202.269090] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2202.270191] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2202.271244] do_syscall_64+0x33/0x40 [ 2202.272018] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2202.273055] RIP: 0033:0x7ffb286e7a04 [ 2202.273827] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2202.277671] RSP: 002b:00007ffb25ca9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2202.279221] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7a04 [ 2202.280695] RDX: 0000000000000002 RSI: 00007ffb25caa000 RDI: 00000000ffffff9c [ 2202.282189] RBP: 00007ffb25caa000 R08: 0000000000000000 R09: ffffffffffffffff [ 2202.283694] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2202.285176] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 2202.334612] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2202.335784] EXT4-fs (loop1): group descriptors corrupted! [ 2202.415292] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2202.423363] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x600}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2202.428173] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 12:46:27 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2202.444534] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:46:27 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 27) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2202.460992] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2202.475534] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2202.477586] EXT4-fs (loop1): group descriptors corrupted! 12:46:27 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') r4 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) shmat(r4, &(0x7f0000ffb000/0x2000)=nil, 0x1000) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) shmctl$IPC_RMID(0x0, 0x0) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2202.517226] FAULT_INJECTION: forcing a failure. [ 2202.517226] name failslab, interval 1, probability 0, space 0, times 0 [ 2202.518781] CPU: 0 PID: 119643 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2202.519566] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2202.520456] Call Trace: [ 2202.520758] dump_stack+0x107/0x167 [ 2202.521159] should_fail.cold+0x5/0xa [ 2202.521576] ? security_file_alloc+0x34/0x170 [ 2202.522058] should_failslab+0x5/0x20 [ 2202.522475] kmem_cache_alloc+0x5b/0x360 [ 2202.522933] security_file_alloc+0x34/0x170 [ 2202.523405] __alloc_file+0xb6/0x320 [ 2202.523815] alloc_empty_file+0x6d/0x170 [ 2202.524253] path_openat+0xde/0x26d0 [ 2202.524660] ? path_lookupat+0x860/0x860 [ 2202.525098] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2202.525663] ? lock_acquire+0x197/0x490 [ 2202.526097] do_filp_open+0x17e/0x3d0 [ 2202.526503] ? may_open_dev+0xf0/0xf0 [ 2202.526933] ? __alloc_fd+0x2a5/0x620 [ 2202.527342] ? lock_downgrade+0x6d0/0x6d0 [ 2202.527789] ? rwlock_bug.part.0+0x90/0x90 [ 2202.528249] ? _raw_spin_unlock+0x1a/0x30 [ 2202.528688] ? __alloc_fd+0x2a5/0x620 [ 2202.529124] do_sys_openat2+0x171/0x420 [ 2202.529579] ? build_open_flags+0x690/0x690 [ 2202.530066] ? rcu_read_lock_any_held+0x75/0xa0 [ 2202.530587] __x64_sys_openat+0x13f/0x1f0 [ 2202.531040] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2202.531588] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2202.532173] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2202.532760] do_syscall_64+0x33/0x40 [ 2202.533176] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2202.533750] RIP: 0033:0x7ffb286e7a04 [ 2202.534150] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2202.536216] RSP: 002b:00007ffb25ca9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2202.537059] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7a04 [ 2202.537852] RDX: 0000000000000002 RSI: 00007ffb25caa000 RDI: 00000000ffffff9c [ 2202.538642] RBP: 00007ffb25caa000 R08: 0000000000000000 R09: ffffffffffffffff [ 2202.539446] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2202.540237] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:46:27 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:46:27 executing program 0: r0 = fork() ptrace(0x10, r0) ptrace$cont(0x9, r0, 0x7, 0x5) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) [ 2202.601429] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2202.620115] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:46:27 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000140)={0x1c, 0x33, 0xd, 0xf, 0x7, 0x7ff, 0x1, 0x7a, 0x1}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x700}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:46:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:27 executing program 6: r0 = fork() ptrace(0x10, r0) r1 = getpid() ioprio_get$pid(0x3, r1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000002c0)=ANY=[@ANYBLOB="01100000011f003dd655d5e5", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, r2, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r3, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r4 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r4, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r5 = fork() syz_open_procfs(r5, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r5, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:46:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2202.785941] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2202.787607] EXT4-fs (loop1): group descriptors corrupted! 12:46:27 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 28) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:28 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000180)={0x4, 0x9, 0x7, 0x1e, 0x0, 0x10000, 0x0, 0x84, 0xffffffffffffffff}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000001c0)="ed21e8c6505f8198caf783974627d94f52009446f46552e0f4655fe0f4655f000000000000040004", 0x28, 0x20000020ff}], 0x0, &(0x7f0000000140)={[], [{@audit}, {@dont_hash}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000200)={0x28, 0x5, 0x3, 0xc, 0x8, 0x9, 0x3, 0x69, 0xffffffffffffffff}) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2202.913474] FAULT_INJECTION: forcing a failure. [ 2202.913474] name failslab, interval 1, probability 0, space 0, times 0 [ 2202.915622] CPU: 0 PID: 120120 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2202.916713] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2202.917984] Call Trace: [ 2202.918398] dump_stack+0x107/0x167 [ 2202.918964] should_fail.cold+0x5/0xa [ 2202.919590] ? create_object.isra.0+0x3a/0xa20 [ 2202.920334] should_failslab+0x5/0x20 [ 2202.920963] kmem_cache_alloc+0x5b/0x360 [ 2202.921637] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2202.922528] create_object.isra.0+0x3a/0xa20 [ 2202.923200] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2202.924028] kmem_cache_alloc+0x159/0x360 [ 2202.924706] security_file_alloc+0x34/0x170 [ 2202.925424] __alloc_file+0xb6/0x320 [ 2202.926036] alloc_empty_file+0x6d/0x170 [ 2202.926683] path_openat+0xde/0x26d0 [ 2202.927313] ? path_lookupat+0x860/0x860 [ 2202.927993] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2202.928855] ? lock_acquire+0x197/0x490 [ 2202.929523] do_filp_open+0x17e/0x3d0 [ 2202.930158] ? may_open_dev+0xf0/0xf0 [ 2202.930797] ? __alloc_fd+0x2a5/0x620 [ 2202.931394] ? lock_downgrade+0x6d0/0x6d0 [ 2202.932050] ? rwlock_bug.part.0+0x90/0x90 [ 2202.932735] ? _raw_spin_unlock+0x1a/0x30 [ 2202.933412] ? __alloc_fd+0x2a5/0x620 [ 2202.934050] do_sys_openat2+0x171/0x420 [ 2202.934682] ? build_open_flags+0x690/0x690 [ 2202.935395] ? rcu_read_lock_any_held+0x75/0xa0 [ 2202.936168] __x64_sys_openat+0x13f/0x1f0 [ 2202.936836] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2202.937575] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2202.938434] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2202.939278] do_syscall_64+0x33/0x40 [ 2202.939897] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2202.940750] RIP: 0033:0x7ffb286e7a04 [ 2202.941347] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2202.944332] RSP: 002b:00007ffb25ca9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2202.945582] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb286e7a04 [ 2202.946761] RDX: 0000000000000002 RSI: 00007ffb25caa000 RDI: 00000000ffffff9c [ 2202.947923] RBP: 00007ffb25caa000 R08: 0000000000000000 R09: ffffffffffffffff [ 2202.949094] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2202.950279] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:46:28 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x1b6b, 0x7) fork() 12:46:28 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x100, 0x20) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:28 executing program 4: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000002a40)) syz_io_uring_setup(0x142f, &(0x7f0000000380)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x3, 0x0, r4}, 0x0) r5 = syz_io_uring_setup(0x142f, &(0x7f0000000380)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) r9 = socket$inet_udp(0x2, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8], 0x6) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000001980)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) io_uring_register$IORING_REGISTER_PROBE(r10, 0x8, &(0x7f00000019c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x1e) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x3, 0x0, r9}, 0x0) r11 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000006, 0x4013, r5, 0x8000000) syz_io_uring_submit(r11, r7, &(0x7f0000000080), 0x0) r12 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r7, &(0x7f0000001940)=@IORING_OP_WRITEV={0x2, 0x1, 0x70c7990a9de03ba0, @fd=r0, 0x4, &(0x7f0000001840)=[{&(0x7f0000000200)="f9beb718b524682cc121e7287b4cf2c64e99213e990e49aa2b16962d3d3e7f0a29813f04ce5821852351c91836a868a7532b3891f087b1b379c8f703e406b80bc9901c59f2749833597b9f", 0x4b}, {&(0x7f0000000280)="96d4f9075d403d895b5377aef73f39a2f4ab370631c644853cc13fa41814f1e2988b9e9cfe0998460f3f30861d90d579306ddd665d24c18f5c37b5864def23b437a8e3ce704aed93ba65903b5b4e7dbb31daf3a94682c73492c6f70b6f1d1c3fbeff1386f52fb1c52d5d0e341b576dcb47b06fc0804e90081a4c608b18e1b80fdb7dff5c99167572c21692a559565c85a515d8dd6d576415a44cbfc9bb5b39a07b2e8664ab9504e67adfab4e197f668c5dccb94f85d9c114d140f6cea10a69f1c8d59fcba7c975dd0b009deb929abe016bcd11d079662a3c507e4db6e0c39e58bbdf5d152bf317adf6997dcce4a2", 0xee}, {&(0x7f0000000380)="14cb651c7ad4f2412a0f434655cc391ab29773e26109471b6802bb462803adafc03160aee6f1ef88f688beb91760e6615fdd38c9425c5ed7659f958417b3ccbbe18305dddea6d7ca78f493ccd8", 0x4d}, {&(0x7f0000000400)="5867eb3c4c81e8e0e326060aed659ad2b641936bc129898c53441c6ea4017bf66221418398a2f440c28ff47e1ddd13d89e5db6926e7e500fb9c1b6ce673c5ef3f075642f8ddc9514137642384119de7e64d0845e78cadfbfcd105241b38c3245", 0x60}, {&(0x7f0000000480)="feb2c0c0344410cb85489e65f9ac49e69344b217f109efd65920ab0b775fb76a82b34e94d82ea4efb4dba84cda1ea700aef641c60dd466baa341780dd2b9ddfb660c35b778ae6593cdf92b3afc11134a7871916b5ee1f4d02607ff92a0472234", 0x60}, {&(0x7f0000000500)="769338ddb7cfa6e3a68413714e8c98867174dc8aeae4c274f673fe5a539f48f53b9ab40d1fecf755dff08be11d3c989b7ee3fab769adbabf1c730e0cbc97ce66578a4440eb97b1de1a4129e983452ec01a1c395ec6fd2edcfb6eccbd9fd4a84a85dd03013c5ba847f5262e685308c81ddeb58066a7097000759e763b5cbf2ab48d8f4040de47a3e06cccd057d289f01d39cdca99c4315cf55086613340ce4c0b844550096ca0bf6fbd0c393102e3c5e652872c507fe9a1885d650d323f164409e074ff3d0a2ec7ecf3bbe62038b813bc68e138b9bcd06deb83c9da7b4017236804dda079bf1100c61d22ab974b53ca22da04377720ee0699a669", 0xfa}, {&(0x7f0000000600)="df7d570c4b0a300e4f8d945c5e5a97a70dc49dcbb689077fc23997ac7c24de19180276917211c81d84a3c4e0c385ced4b9c98445b9e76bede28a4f11bf4ea00d105446921760c79b0b347d0c303f7329366bc0a8829987864163ebf9cdd99dcce44e76dc831ff5a5ee01db8bbba02d6c86c698d37c65c2bb54bb8ea955046732966526f4445515ebbebd3cbb57227c183b66017f0584d40cb6a8da41c433bb931f0ad9fd1cf3d0a4b196f6c706c8f59e02f7d597d7896c7711a23b65202e7a", 0xbf}, {&(0x7f0000000740)="ba27141620cf9dc6b560fbc3c3c4ae9494199936b60b726a26dfe4314b50c595a8d17c577af2feea4b6ae8995ed9b8e10328d1edf3bb739d320ca5de0b95fe138b571f1503fc698d6c9352b3690904929448153ae18a2ffb980bbc16c41a5b5c5975fa5a78bb5a6a8572cb23258c0f59c88466d8cc6c5efdb0969aa18134e1ee81fcf31e7b", 0x85}, {&(0x7f0000000800)="c54b22d298197ea1c0a5730c30", 0xd}, {&(0x7f0000000840)="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", 0x1000}], 0xa, 0x1, 0x1, {0x3, r12}}, 0x81) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000001900)=[0xffffffffffffffff], 0x1) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_SEND={0x1a, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)="c2b69a08f1b4167a02d4709f58b049a26095049fdd1a9d93008f9d7a903ea0872faa283dd94ad7a27069ef0f12b2954dc532dd5df0a06809c4cabea959ff77e22faf442e3cb4d0f700c1343ed18bed10b024ca10a26db1f7043a98532d8c0d10a30854e5123888d020a6e7908810dbf12d37088af3ae03406fe7bbd1579d21ad0c6e586578d87363073b0291222d504a2ef142fbaba35a53f753a5f08dde8a1a508ceb195274c30af35f32ea0cb558fc6fd75ee093fcad95d1192dacb8ac473dffa5194aa8cac698657245c5df0ecbe59c0901626fe97e9439ac13abfe08be4438", 0xe1, 0x4000, 0x0, {0x0, r13}}, 0x2) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000700)={0x0, 0x2, &(0x7f00000006c0)=[0xffffffffffffffff]}, 0x1) [ 2203.174407] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2203.180500] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2203.210195] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2203.219387] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2203.239661] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:46:41 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:46:41 executing program 0: r0 = fork() ptrace(0x10, r0) pidfd_open(r0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$cont(0x9, r0, 0x1, 0x7) 12:46:41 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() ptrace$setopts(0x4200, 0xffffffffffffffff, 0x3, 0x64) syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) process_vm_readv(0xffffffffffffffff, &(0x7f0000000880)=[{&(0x7f0000000700)=""/66, 0x42}, {&(0x7f0000000780)=""/217, 0xd9}], 0x2, &(0x7f0000000e40)=[{&(0x7f00000008c0)=""/122, 0x7a}, {&(0x7f0000000940)=""/86, 0x56}, {&(0x7f00000009c0)=""/213, 0xd5}, {&(0x7f0000000ac0)=""/6, 0x6}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/250, 0xfa}, {&(0x7f0000000d00)=""/220, 0xdc}, {&(0x7f0000000e00)=""/14, 0xe}], 0x8, 0x0) getxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@random={'btrfs.', '\x00'}, &(0x7f00000006c0)=""/19, 0x13) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:46:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) fchown(r1, 0x0, 0x0) ioctl$EXT4_IOC_GETSTATE(r1, 0x40046629, &(0x7f0000000080)) lseek(r0, 0x0, 0x0) 12:46:41 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 29) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:41 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:41 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x900}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:46:41 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x9, 0x1c, 0xa, 0x12, 0x4, 0x876, 0x0, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00a32f7b4a7eef5926af6425155674d41e5996d914b6970e0428b4affbe4474d3a5da516a72ae4ef18957503ec8e7dd295c54b0f878970a483747bdf3b0390b64f6778bc021f99bee45c9960ab9eff93eb25382bcbffac1576b7668654ca04babc041ae04d945741686879fc4cea01d30b56612ad6470c18403d73bae1460370e670bd514fc2490e992779c3e7525b14b1738a75c75f4cb5f3c79f5c2dfb1bc55ecee965db"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, r2) ftruncate(0xffffffffffffffff, 0x1) r3 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0xa, r3) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2216.029242] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2216.031463] EXT4-fs (loop1): group descriptors corrupted! [ 2216.065435] FAULT_INJECTION: forcing a failure. [ 2216.065435] name failslab, interval 1, probability 0, space 0, times 0 [ 2216.068574] CPU: 1 PID: 120731 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2216.070134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2216.072005] Call Trace: [ 2216.072600] dump_stack+0x107/0x167 [ 2216.073417] should_fail.cold+0x5/0xa [ 2216.074279] ? __kthread_create_on_node+0xd1/0x400 [ 2216.075584] should_failslab+0x5/0x20 [ 2216.076478] kmem_cache_alloc_trace+0x55/0x360 [ 2216.077553] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2216.078662] __kthread_create_on_node+0xd1/0x400 [ 2216.079790] ? __kthread_parkme+0x1d0/0x1d0 [ 2216.080816] ? __mutex_lock+0xd78/0x1260 [ 2216.081731] ? loop_configure+0xcb5/0x1480 [ 2216.082690] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2216.083777] kthread_create_on_node+0xbb/0x100 [ 2216.084804] ? __kthread_create_on_node+0x400/0x400 [ 2216.085932] ? lockdep_init_map_type+0x2c7/0x780 [ 2216.087006] ? lockdep_init_map_type+0x2c7/0x780 [ 2216.088095] loop_configure+0x3e3/0x1480 [ 2216.089026] lo_ioctl+0xa72/0x1760 [ 2216.089825] ? avc_has_extended_perms+0x7f1/0xec0 [ 2216.090917] ? loop_set_status_old+0x250/0x250 [ 2216.091986] ? avc_ss_reset+0x180/0x180 [ 2216.092921] ? find_held_lock+0x2c/0x110 [ 2216.093851] ? __lock_acquire+0xbb1/0x5b00 [ 2216.094878] ? selinux_inode_getsecctx+0x90/0x90 [ 2216.095964] ? generic_block_fiemap+0x60/0x60 [ 2216.097000] ? loop_set_status_old+0x250/0x250 [ 2216.098041] blkdev_ioctl+0x291/0x710 [ 2216.098912] ? blkdev_common_ioctl+0x1870/0x1870 [ 2216.100003] ? selinux_file_ioctl+0xb1/0x260 [ 2216.101013] block_ioctl+0xf9/0x140 [ 2216.101840] ? blkdev_read_iter+0x1c0/0x1c0 [ 2216.102826] __x64_sys_ioctl+0x19a/0x210 [ 2216.103775] do_syscall_64+0x33/0x40 [ 2216.104628] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2216.105792] RIP: 0033:0x7ffb287348d7 [ 2216.106670] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2216.110870] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2216.112644] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2216.114276] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2216.115935] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2216.117587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2216.119257] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:46:41 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2216.245794] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2216.250177] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2216.304500] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2216.305884] EXT4-fs (loop1): group descriptors corrupted! [ 2216.354385] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:46:54 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ptrace$cont(0x7, r1, 0x7, 0x8) 12:46:54 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, r2) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:54 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:46:54 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0xf00}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:46:54 executing program 6: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f00000002c0)='io\x00', &(0x7f0000000300)='./file1\x00', 0xffffffffffffffff) r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x400000, 0x54000000, &(0x7f0000c00000/0x400000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:46:54 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 30) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2229.138452] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2229.139504] EXT4-fs (loop1): group descriptors corrupted! 12:46:54 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x16, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x1ff, 0x6, 0x5, 0xb30}, {0x8, 0x19, 0x1, 0x101}, {0x2, 0x6, 0x1, 0x6}, {0x7fff, 0x1, 0x37, 0x1}]}) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\'-(\x00') fallocate(r1, 0x3, 0x0, 0x8000) [ 2229.155504] FAULT_INJECTION: forcing a failure. [ 2229.155504] name failslab, interval 1, probability 0, space 0, times 0 [ 2229.156785] CPU: 0 PID: 121364 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2229.157542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2229.158437] Call Trace: [ 2229.158731] dump_stack+0x107/0x167 [ 2229.159130] should_fail.cold+0x5/0xa [ 2229.159552] ? create_object.isra.0+0x3a/0xa20 [ 2229.160053] should_failslab+0x5/0x20 [ 2229.160469] kmem_cache_alloc+0x5b/0x360 [ 2229.160910] create_object.isra.0+0x3a/0xa20 [ 2229.161378] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2229.161938] kmem_cache_alloc_trace+0x151/0x360 [ 2229.162448] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2229.162964] __kthread_create_on_node+0xd1/0x400 [ 2229.163449] ? __kthread_parkme+0x1d0/0x1d0 [ 2229.163929] ? __mutex_lock+0x425/0x1260 [ 2229.164366] ? loop_configure+0xcb5/0x1480 [ 2229.164808] ? loop_info64_to_compat+0x5f0/0x5f0 [ 2229.165335] kthread_create_on_node+0xbb/0x100 [ 2229.165829] ? __kthread_create_on_node+0x400/0x400 [ 2229.166381] ? lockdep_init_map_type+0x2c7/0x780 [ 2229.166885] ? lockdep_init_map_type+0x2c7/0x780 [ 2229.167411] loop_configure+0x3e3/0x1480 [ 2229.167865] lo_ioctl+0xa72/0x1760 [ 2229.168257] ? avc_has_extended_perms+0x7f1/0xec0 [ 2229.168748] ? loop_set_status_old+0x250/0x250 [ 2229.169248] ? avc_ss_reset+0x180/0x180 [ 2229.169682] ? find_held_lock+0x2c/0x110 [ 2229.170123] ? __lock_acquire+0xbb1/0x5b00 [ 2229.170605] ? selinux_inode_getsecctx+0x90/0x90 [ 2229.171125] ? generic_block_fiemap+0x60/0x60 [ 2229.171587] ? loop_set_status_old+0x250/0x250 [ 2229.172087] blkdev_ioctl+0x291/0x710 [ 2229.172505] ? blkdev_common_ioctl+0x1870/0x1870 [ 2229.172994] ? selinux_file_ioctl+0xb1/0x260 [ 2229.173473] block_ioctl+0xf9/0x140 [ 2229.173868] ? blkdev_read_iter+0x1c0/0x1c0 [ 2229.174336] __x64_sys_ioctl+0x19a/0x210 [ 2229.174783] do_syscall_64+0x33/0x40 [ 2229.175190] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2229.175725] RIP: 0033:0x7ffb287348d7 [ 2229.176128] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2229.177962] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2229.178740] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2229.179471] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2229.180189] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2229.180904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2229.181615] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:46:54 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2229.289854] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2229.290850] EXT4-fs (loop1): group descriptors corrupted! 12:46:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x7, 0x1ff, 0x1}) r1 = fork() ptrace(0x10, r1) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r1, 0x7, 0x7) 12:46:54 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2229.319767] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2229.326633] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2229.331147] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2229.345635] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2229.352356] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:46:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000001640)) setfsuid(r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='attr/fscreate\x00') syz_io_uring_setup(0x3038, &(0x7f0000000300)={0x0, 0x58c3, 0x2, 0x3, 0x217, 0x0, r2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080), 0x13c0000, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@posixacl}, {@privport}], [{@smackfstransmute={'smackfstransmute', 0x3d, '[@'}}, {@fsname={'fsname', 0x3d, '&$:'}}, {@appraise_type}, {@smackfsfloor}, {@smackfstransmute={'smackfstransmute', 0x3d, '/&.-)'}}]}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) pivot_root(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='./file0\x00') pwrite64(r3, &(0x7f0000000400)="2418333378935ebaca93c4aeae33b3105e64d2311b11dda6358e5dd1b5d5a11b1e04628708660e71b7e0ffa0478759b6460c4929a1af4180ef358a198a8851a755fed51a8ca4e9e0dd2011fd033c0e694c4dc8114b5f6321e7ebe30414389438e5e645911ad9ab7f013f0b41acce62d0bf88d0bb087bdad3cda93c1c307054b961b51fbb365c6bf48d846a0434e07bded970b5c405891a177f091fac1e44580522edfc5a0e65f9a783f4c2eb3d0200c8b9ff5859419472fed3e41297e1bd78", 0xbf, 0xcbad) 12:46:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0x8004}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:46:54 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 31) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:46:54 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2229.462778] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2229.464539] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2229.470052] FAULT_INJECTION: forcing a failure. [ 2229.470052] name failslab, interval 1, probability 0, space 0, times 0 [ 2229.471293] CPU: 0 PID: 121917 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2229.471998] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2229.472893] Call Trace: [ 2229.473173] dump_stack+0x107/0x167 [ 2229.473576] should_fail.cold+0x5/0xa [ 2229.473986] ? __kernfs_new_node+0xd4/0x850 [ 2229.474465] should_failslab+0x5/0x20 [ 2229.474883] kmem_cache_alloc+0x5b/0x360 [ 2229.475336] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2229.475907] __kernfs_new_node+0xd4/0x850 [ 2229.476365] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2229.476877] ? mark_held_locks+0x9e/0xe0 [ 2229.477297] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2229.477865] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2229.478420] ? trace_hardirqs_on+0x5b/0x180 [ 2229.478895] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2229.479465] ? device_namespace+0xd0/0xd0 [ 2229.479919] kernfs_create_dir_ns+0x9c/0x230 [ 2229.480405] internal_create_group+0x793/0xb30 [ 2229.480903] ? trace_hardirqs_on+0x5b/0x180 [ 2229.481370] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2229.481958] ? sysfs_remove_group+0x170/0x170 [ 2229.482456] ? blk_queue_flag_set+0x22/0x30 [ 2229.482924] ? __loop_update_dio+0x2d2/0x690 [ 2229.483379] loop_configure+0x954/0x1480 [ 2229.483826] lo_ioctl+0xa72/0x1760 [ 2229.484217] ? avc_has_extended_perms+0x7f1/0xec0 [ 2229.484739] ? loop_set_status_old+0x250/0x250 [ 2229.485245] ? avc_ss_reset+0x180/0x180 [ 2229.485687] ? __lock_acquire+0xbb1/0x5b00 [ 2229.486175] ? selinux_inode_getsecctx+0x90/0x90 [ 2229.486690] ? generic_block_fiemap+0x60/0x60 [ 2229.487179] ? loop_set_status_old+0x250/0x250 [ 2229.487657] blkdev_ioctl+0x291/0x710 [ 2229.488076] ? blkdev_common_ioctl+0x1870/0x1870 [ 2229.488611] ? selinux_file_ioctl+0xb1/0x260 [ 2229.489060] block_ioctl+0xf9/0x140 [ 2229.489479] ? blkdev_read_iter+0x1c0/0x1c0 [ 2229.489921] __x64_sys_ioctl+0x19a/0x210 [ 2229.490384] do_syscall_64+0x33/0x40 [ 2229.490790] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2229.491318] RIP: 0033:0x7ffb287348d7 [ 2229.491721] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2229.493564] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2229.494393] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2229.495108] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2229.495827] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2229.496538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2229.497249] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 2229.576111] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2229.579934] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:47:07 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 32) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:07 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:07 executing program 0: r0 = fork() waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) 12:47:07 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:07 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xffdd}, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaaccd, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="10"]) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0x73c90}}, './file0\x00'}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:07 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r2, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() syz_open_procfs(r4, &(0x7f0000000040)='io\x00') ptrace$peeksig(0x4209, r1, &(0x7f00000002c0)={0xc9, 0x1, 0x3}, &(0x7f00000006c0)=[{}, {}, {}]) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r4, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:47:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0xf000}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:47:07 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2242.189293] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2242.190912] EXT4-fs (loop1): group descriptors corrupted! [ 2242.195214] FAULT_INJECTION: forcing a failure. [ 2242.195214] name failslab, interval 1, probability 0, space 0, times 0 [ 2242.197510] CPU: 0 PID: 122224 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2242.198709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2242.200112] Call Trace: [ 2242.200562] dump_stack+0x107/0x167 [ 2242.201174] should_fail.cold+0x5/0xa [ 2242.201816] ? create_object.isra.0+0x3a/0xa20 [ 2242.202585] should_failslab+0x5/0x20 [ 2242.203228] kmem_cache_alloc+0x5b/0x360 [ 2242.203938] create_object.isra.0+0x3a/0xa20 [ 2242.204678] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2242.205530] kmem_cache_alloc+0x159/0x360 [ 2242.206258] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2242.207145] __kernfs_new_node+0xd4/0x850 [ 2242.207849] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2242.208759] ? lock_chain_count+0x20/0x20 [ 2242.209453] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2242.210277] ? find_held_lock+0x2c/0x110 [ 2242.210976] ? set_user_nice.part.0+0x2fd/0x760 [ 2242.211801] kernfs_create_dir_ns+0x9c/0x230 [ 2242.212564] internal_create_group+0x793/0xb30 [ 2242.213362] ? set_user_nice.part.0+0x2fd/0x760 [ 2242.214182] ? sysfs_remove_group+0x170/0x170 [ 2242.214935] ? lockdep_init_map_type+0x2c7/0x780 [ 2242.215761] ? blk_queue_flag_set+0x22/0x30 [ 2242.216520] ? __loop_update_dio+0x2d2/0x690 [ 2242.217287] loop_configure+0x954/0x1480 [ 2242.218007] lo_ioctl+0xa72/0x1760 [ 2242.218627] ? avc_has_extended_perms+0x7f1/0xec0 [ 2242.219468] ? loop_set_status_old+0x250/0x250 [ 2242.220272] ? avc_ss_reset+0x180/0x180 [ 2242.220971] ? find_held_lock+0x2c/0x110 [ 2242.221676] ? __lock_acquire+0xbb1/0x5b00 [ 2242.222471] ? selinux_inode_getsecctx+0x90/0x90 [ 2242.223264] ? generic_block_fiemap+0x60/0x60 [ 2242.224081] ? loop_set_status_old+0x250/0x250 [ 2242.224847] blkdev_ioctl+0x291/0x710 [ 2242.225516] ? blkdev_common_ioctl+0x1870/0x1870 [ 2242.226317] ? selinux_file_ioctl+0xb1/0x260 [ 2242.227084] block_ioctl+0xf9/0x140 [ 2242.227709] ? blkdev_read_iter+0x1c0/0x1c0 [ 2242.228461] __x64_sys_ioctl+0x19a/0x210 [ 2242.229145] do_syscall_64+0x33/0x40 [ 2242.229790] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2242.230652] RIP: 0033:0x7ffb287348d7 [ 2242.231309] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2242.234500] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2242.235836] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2242.237076] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2242.238308] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2242.239544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2242.240777] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 2242.364302] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2242.367272] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2242.371500] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2242.373582] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:47:07 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 33) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {0x6, 0x0, 0xffff}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:47:07 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x3, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2242.524740] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.5'. 12:47:07 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 12:47:07 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r1 = shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r2, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() syz_open_procfs(r4, &(0x7f0000000040)='io\x00') shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r4, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2242.582319] FAULT_INJECTION: forcing a failure. [ 2242.582319] name failslab, interval 1, probability 0, space 0, times 0 [ 2242.584646] CPU: 0 PID: 122945 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2242.585675] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2242.586921] Call Trace: [ 2242.587326] dump_stack+0x107/0x167 [ 2242.587884] should_fail.cold+0x5/0xa [ 2242.588468] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2242.589302] should_failslab+0x5/0x20 [ 2242.589874] kmem_cache_alloc+0x5b/0x360 [ 2242.590491] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2242.591321] idr_get_free+0x4b5/0x8f0 [ 2242.591913] idr_alloc_u32+0x170/0x2d0 [ 2242.592476] ? __fprop_inc_percpu_max+0x130/0x130 [ 2242.593164] ? lock_acquire+0x197/0x490 [ 2242.593731] ? __kernfs_new_node+0xff/0x850 [ 2242.594352] idr_alloc_cyclic+0x102/0x230 [ 2242.594945] ? idr_alloc+0x130/0x130 [ 2242.595486] ? rwlock_bug.part.0+0x90/0x90 [ 2242.596099] __kernfs_new_node+0x117/0x850 [ 2242.596698] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2242.597441] ? lock_chain_count+0x20/0x20 [ 2242.598028] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2242.598706] ? find_held_lock+0x2c/0x110 [ 2242.599289] ? set_user_nice.part.0+0x2fd/0x760 [ 2242.599964] kernfs_create_dir_ns+0x9c/0x230 [ 2242.600598] internal_create_group+0x793/0xb30 [ 2242.601264] ? set_user_nice.part.0+0x2fd/0x760 [ 2242.601933] ? sysfs_remove_group+0x170/0x170 [ 2242.602578] ? lockdep_init_map_type+0x2c7/0x780 [ 2242.603250] ? blk_queue_flag_set+0x22/0x30 [ 2242.603873] ? __loop_update_dio+0x2d2/0x690 [ 2242.604500] loop_configure+0x954/0x1480 [ 2242.605090] lo_ioctl+0xa72/0x1760 [ 2242.605599] ? avc_has_extended_perms+0x7f1/0xec0 [ 2242.606286] ? loop_set_status_old+0x250/0x250 [ 2242.606942] ? avc_ss_reset+0x180/0x180 [ 2242.607522] ? find_held_lock+0x2c/0x110 [ 2242.608114] ? __lock_acquire+0xbb1/0x5b00 [ 2242.608753] ? selinux_inode_getsecctx+0x90/0x90 [ 2242.609423] ? generic_block_fiemap+0x60/0x60 [ 2242.610068] ? loop_set_status_old+0x250/0x250 [ 2242.610718] blkdev_ioctl+0x291/0x710 [ 2242.611258] ? blkdev_common_ioctl+0x1870/0x1870 [ 2242.611940] ? selinux_file_ioctl+0xb1/0x260 [ 2242.612569] block_ioctl+0xf9/0x140 [ 2242.613082] ? blkdev_read_iter+0x1c0/0x1c0 [ 2242.613694] __x64_sys_ioctl+0x19a/0x210 [ 2242.614271] do_syscall_64+0x33/0x40 [ 2242.614795] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2242.615531] RIP: 0033:0x7ffb287348d7 [ 2242.616057] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2242.618642] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2242.619735] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2242.620737] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2242.621743] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2242.622739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2242.623748] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 2242.643128] EXT4-fs: failed to create workqueue [ 2242.644536] EXT4-fs (loop4): mount failed 12:47:07 executing program 0: setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)="91df46ad7a14a4a720c7b8e48ed89d23ca28bfc6a61179c3960649e68098b5283083e9ce6b8c714055962168337c3a4773600bececd11a77874b24fb529804d5adf8413839fcb9d7", 0x48) r0 = fork() syz_open_dev$vcsu(&(0x7f0000000080), 0x9, 0x242000) syz_open_procfs$namespace(r0, &(0x7f00000003c0)='ns/time\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) r4 = getpid() ioprio_get$pid(0x3, r4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r5, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000600)=[{{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000140)="e6eda6d32feb7db04bb4996ca643dc4990a005b86df9a9f61771c242d88fb5b0a38df1c99697774ac72dc3543a358c469d90541725fb8ec752b026decc5102a9b221f31da06ae5cea13b92a932296b337aa6bee5a27cc326caa63a8748c80d581c4214b6b5bd431098bee3e912f3a7aa72048752ada30ccbb5ac0b7cb839ed3bea134ddf261290c3f4e8c91c2cf365b0ec1dd14d117a358a87ffe4ff8498e0b2be6edb91770d5e6fe1044e4aaa5d09e8b42e9ea48ba15e1ed4d8c609612cc7aa61c775351311134aa246a6e2a4420bf5382b332256cf2b8a06ab115bcf1b05e438", 0xe1}, {&(0x7f0000000240)="0380e67387773b4ae3515bcd0ebe05f391c16e592518d3b4d6f485dac11aa4004a127288aa7f267d34c6d6e63bf74815ce0c375c539e7d73c749c89233153e8fe56b5b4c0850f012f71fe73c5133847c85b737be1a731786d366de31c104c98680d703117c214d8fa1001661d604c31bb04f57fd239cbf5ca775011dafb9e600b2504e0c75", 0x85}, {&(0x7f0000000300)="e6fa58423710fddf278e38f203c231dae2b5db0e7b16ba", 0x17}, {&(0x7f0000000540)="36e82286a1fc1e54842c45ed70c687bb28ad9b9dcac7b94f3d7b258fc79a5e0e4d77d09ff452839793f858ea14452d89", 0x30}], 0x4, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [r5]}}], 0x18, 0x20000041}}], 0x1, 0x884) ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x7, 0x7) [ 2242.658602] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2242.660515] EXT4-fs (loop1): group descriptors corrupted! 12:47:07 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b, 0x1}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="20bb4f0dea590310cc2d2888f67f781a46ed309f1a2e8224d16269835aba7068249d49af5a018c4c9138da2620fec630da0e5e2e2e343130095a303844cc6d6d9d1b87feadd634cb20cdeea7f21072b743238de369ef663307dce0ed5021363c6bb01e9873873298a4eb4227a9b54dde550cb93dfb67ad400250e2ecec5e5fb6650c"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2242.709182] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2242.768611] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2242.779414] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2242.794273] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2242.920265] EXT4-fs (loop3): Unrecognized mount option " »OêYÌ-(ˆöxFí0Ÿ.‚$ÑbiƒZºph$I¯ZŒL‘8Ú& þÆ0Ú^..410 Z08DÌmm‡þ­Ö4Ë Íî§òr·C#ãiïf3ÜàíP!60x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = syz_open_pts(0xffffffffffffffff, 0x801) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000000)=0x3ff) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() syz_open_procfs(r4, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) waitid(0x1, r4, &(0x7f0000000080), 0x4, &(0x7f00000003c0)) 12:47:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x38, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:47:22 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:22 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:22 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 34) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:22 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 12:47:22 executing program 0: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x3ff, 0xb3e}) r0 = fork() ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x7, &(0x7f0000000040)="ded1feae88a4e24a2fa70cdc20376508134fc2d356913577ae6b8c5bbd953be6fea75ea3cd2bf2fb1abffaecf4921c7f7403a6c533d8bb02d8f2c0124105a9049b8fad39f0292b632c67273fcc6cffc58d8a35af0ec1a87127d660193ae8cb453c5ec599a77e0e74ea36b1692b2feb80f8ae298ba608b40778ce5fc301f49976b9f3984c7307b95c978e69cc167efcb5caeccbc2732145915e52e3d099b6747dcd13dbac13890430204d7ab73fb0e59b3eb695147387") ptrace$cont(0x9, r0, 0x8, 0xffffffff) setpriority(0x1, r0, 0x1) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0xa, 0x200000000007) [ 2257.374150] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2257.376312] EXT4-fs (loop1): group descriptors corrupted! [ 2257.390467] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2257.404146] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 2257.413231] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2257.418989] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2257.422373] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2257.428695] FAULT_INJECTION: forcing a failure. [ 2257.428695] name failslab, interval 1, probability 0, space 0, times 0 [ 2257.432257] CPU: 1 PID: 123519 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2257.433830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2257.435688] Call Trace: [ 2257.436318] dump_stack+0x107/0x167 [ 2257.437115] should_fail.cold+0x5/0xa [ 2257.437921] ? create_object.isra.0+0x3a/0xa20 [ 2257.438877] should_failslab+0x5/0x20 [ 2257.439682] kmem_cache_alloc+0x5b/0x360 [ 2257.440543] create_object.isra.0+0x3a/0xa20 [ 2257.441465] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2257.442553] kmem_cache_alloc+0x159/0x360 [ 2257.443440] __kernfs_new_node+0xd4/0x850 [ 2257.444346] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2257.445431] ? lock_downgrade+0x6d0/0x6d0 [ 2257.446314] ? mutex_lock_io_nested+0x1110/0x1110 [ 2257.447319] ? __kernfs_new_node+0x549/0x850 [ 2257.448292] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2257.449329] kernfs_new_node+0x93/0x120 [ 2257.450181] __kernfs_create_file+0x51/0x350 [ 2257.451106] sysfs_add_file_mode_ns+0x221/0x560 [ 2257.452115] internal_create_group+0x324/0xb30 [ 2257.453097] ? sysfs_remove_group+0x170/0x170 [ 2257.454040] ? lockdep_init_map_type+0x2c7/0x780 [ 2257.455033] ? blk_queue_flag_set+0x22/0x30 [ 2257.455945] ? __loop_update_dio+0x2d2/0x690 [ 2257.456846] loop_configure+0x954/0x1480 [ 2257.457696] lo_ioctl+0xa72/0x1760 [ 2257.458452] ? avc_has_extended_perms+0x7f1/0xec0 [ 2257.459456] ? loop_set_status_old+0x250/0x250 [ 2257.460431] ? avc_ss_reset+0x180/0x180 [ 2257.461267] ? find_held_lock+0x2c/0x110 [ 2257.462118] ? __lock_acquire+0xbb1/0x5b00 [ 2257.463063] ? selinux_inode_getsecctx+0x90/0x90 [ 2257.464075] ? generic_block_fiemap+0x60/0x60 [ 2257.465014] ? loop_set_status_old+0x250/0x250 [ 2257.465978] blkdev_ioctl+0x291/0x710 [ 2257.466758] ? blkdev_common_ioctl+0x1870/0x1870 [ 2257.467769] ? selinux_file_ioctl+0xb1/0x260 [ 2257.468705] block_ioctl+0xf9/0x140 [ 2257.469472] ? blkdev_read_iter+0x1c0/0x1c0 [ 2257.470369] __x64_sys_ioctl+0x19a/0x210 [ 2257.471226] do_syscall_64+0x33/0x40 [ 2257.472029] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2257.473129] RIP: 0033:0x7ffb287348d7 [ 2257.473917] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2257.477738] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2257.479336] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2257.480823] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2257.482339] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2257.483842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2257.485317] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:47:22 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x52}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r4, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000300)=[r4], 0x1) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:47:22 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x4c, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:47:22 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) [ 2257.593578] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2257.596744] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:47:22 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="b267f2b800e910c53a73b6d0f6c41dd970aa384524ba4b30490467a6ab523ac95c6945856d0396daf40a0c7f76b936a3df0302a4bad1102a03d4aeadcd73c8758580183ad2131a40182e3a7c244542cdeec5f4df5aa649e5e8fc859cc04ba10cf07bab27ec6241dc27a9f56838134f8fabd175628079f9b13c06a79b3151a42aad92aa59ed403d1613ed7904a9be225b8efc301f74c36e6cc7c107135a4d61b57fc63084b8183d56473dba152481ea5303f9a9ca7ca51ac320d8982cd00c"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:22 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:22 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 35) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2257.784404] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2257.786385] EXT4-fs (loop1): group descriptors corrupted! 12:47:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x60, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:47:22 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) ptrace$cont(0x7, r0, 0x3, 0x0) [ 2257.837332] FAULT_INJECTION: forcing a failure. [ 2257.837332] name failslab, interval 1, probability 0, space 0, times 0 [ 2257.840205] CPU: 0 PID: 124326 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2257.841630] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2257.843363] Call Trace: [ 2257.843926] dump_stack+0x107/0x167 [ 2257.844671] should_fail.cold+0x5/0xa [ 2257.845463] ? __kernfs_new_node+0xd4/0x850 [ 2257.846344] should_failslab+0x5/0x20 [ 2257.847115] kmem_cache_alloc+0x5b/0x360 [ 2257.847981] __kernfs_new_node+0xd4/0x850 [ 2257.848831] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2257.849829] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2257.850809] ? wait_for_completion+0x270/0x270 [ 2257.851787] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2257.852866] kernfs_new_node+0x93/0x120 [ 2257.853692] __kernfs_create_file+0x51/0x350 [ 2257.854622] sysfs_add_file_mode_ns+0x221/0x560 [ 2257.855687] internal_create_group+0x324/0xb30 [ 2257.856757] ? sysfs_remove_group+0x170/0x170 [ 2257.857782] ? lockdep_init_map_type+0x2c7/0x780 [ 2257.858882] ? blk_queue_flag_set+0x22/0x30 [ 2257.859873] ? __loop_update_dio+0x2d2/0x690 [ 2257.860900] loop_configure+0x954/0x1480 [ 2257.861830] lo_ioctl+0xa72/0x1760 [ 2257.862656] ? avc_has_extended_perms+0x7f1/0xec0 [ 2257.863772] ? loop_set_status_old+0x250/0x250 [ 2257.864727] ? avc_ss_reset+0x180/0x180 [ 2257.865541] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2257.866639] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2257.867746] ? trace_hardirqs_on+0x5b/0x180 [ 2257.868651] ? __lock_acquire+0xbb1/0x5b00 [ 2257.869565] ? selinux_inode_getsecctx+0x90/0x90 [ 2257.870550] ? generic_block_fiemap+0x60/0x60 [ 2257.871474] ? loop_set_status_old+0x250/0x250 [ 2257.872507] blkdev_ioctl+0x291/0x710 [ 2257.873372] ? blkdev_common_ioctl+0x1870/0x1870 [ 2257.874447] ? selinux_file_ioctl+0xb1/0x260 [ 2257.875443] block_ioctl+0xf9/0x140 [ 2257.876288] ? blkdev_read_iter+0x1c0/0x1c0 [ 2257.877263] __x64_sys_ioctl+0x19a/0x210 [ 2257.878182] do_syscall_64+0x33/0x40 [ 2257.879029] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2257.880191] RIP: 0033:0x7ffb287348d7 [ 2257.881035] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2257.885177] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2257.886893] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2257.888514] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2257.890122] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2257.891734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2257.893341] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:47:23 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x3, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2257.930492] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2257.953412] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 12:47:23 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:23 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) r4 = getpid() ioprio_get$pid(0x3, r4) ptrace$setsig(0x4203, r4, 0x1, &(0x7f00000002c0)={0x23, 0x7, 0xa03}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x0, r3, &(0x7f00000006c0), 0x4, &(0x7f00000003c0)) [ 2258.133363] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2258.176687] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2258.186427] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2258.204275] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2258.206153] EXT4-fs (loop1): group descriptors corrupted! 12:47:35 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0xffffffffffffffd9, 0x8, 0x6, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r2, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() syz_open_procfs(r4, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000300)='./file1/file0\x00', &(0x7f00000006c0)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file1\x00', 0x6000, 0x10, &(0x7f00000016c0)) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x2000) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r4, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:47:35 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:35 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 36) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x7, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:47:35 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1, 0xffffffffffffffff) 12:47:35 executing program 0: r0 = fork() ptrace(0x10, r0) gettid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='attr/fscreate\x00') ptrace$cont(0x9, r0, 0x7, 0x7) 12:47:35 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x3, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2270.178280] FAULT_INJECTION: forcing a failure. [ 2270.178280] name failslab, interval 1, probability 0, space 0, times 0 [ 2270.180948] CPU: 0 PID: 124978 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2270.182367] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2270.184068] Call Trace: [ 2270.184612] dump_stack+0x107/0x167 [ 2270.185355] should_fail.cold+0x5/0xa [ 2270.186131] ? create_object.isra.0+0x3a/0xa20 [ 2270.187070] should_failslab+0x5/0x20 [ 2270.187853] kmem_cache_alloc+0x5b/0x360 [ 2270.188689] ? mark_held_locks+0x9e/0xe0 [ 2270.189542] create_object.isra.0+0x3a/0xa20 [ 2270.190489] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2270.191632] kmem_cache_alloc+0x159/0x360 [ 2270.192597] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2270.193849] idr_get_free+0x4b5/0x8f0 [ 2270.194719] idr_alloc_u32+0x170/0x2d0 [ 2270.195596] ? __fprop_inc_percpu_max+0x130/0x130 [ 2270.196673] ? lock_acquire+0x197/0x490 [ 2270.197562] ? __kernfs_new_node+0xff/0x850 [ 2270.198535] idr_alloc_cyclic+0x102/0x230 [ 2270.199460] ? idr_alloc+0x130/0x130 [ 2270.200303] ? rwlock_bug.part.0+0x90/0x90 [ 2270.201261] __kernfs_new_node+0x117/0x850 [ 2270.202209] ? lock_chain_count+0x20/0x20 [ 2270.203134] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2270.204198] ? lock_acquire+0x197/0x490 [ 2270.205089] ? task_rq_lock+0xab/0x270 [ 2270.205973] ? find_held_lock+0x2c/0x110 [ 2270.206892] ? set_user_nice.part.0+0x2fd/0x760 [ 2270.207944] kernfs_create_dir_ns+0x9c/0x230 [ 2270.208937] internal_create_group+0x793/0xb30 [ 2270.209964] ? set_user_nice.part.0+0x2fd/0x760 [ 2270.211005] ? sysfs_remove_group+0x170/0x170 [ 2270.212036] ? lockdep_init_map_type+0x2c7/0x780 [ 2270.213100] ? blk_queue_flag_set+0x22/0x30 [ 2270.214067] ? __loop_update_dio+0x2d2/0x690 [ 2270.215053] loop_configure+0x954/0x1480 [ 2270.215987] lo_ioctl+0xa72/0x1760 [ 2270.216789] ? avc_has_extended_perms+0x7f1/0xec0 [ 2270.217878] ? loop_set_status_old+0x250/0x250 [ 2270.218915] ? avc_ss_reset+0x180/0x180 [ 2270.219852] ? find_held_lock+0x2c/0x110 [ 2270.220775] ? __lock_acquire+0xbb1/0x5b00 [ 2270.221795] ? selinux_inode_getsecctx+0x90/0x90 [ 2270.222853] ? generic_block_fiemap+0x60/0x60 [ 2270.223875] ? loop_set_status_old+0x250/0x250 [ 2270.224895] blkdev_ioctl+0x291/0x710 [ 2270.225762] ? blkdev_common_ioctl+0x1870/0x1870 [ 2270.226832] ? selinux_file_ioctl+0xb1/0x260 [ 2270.227849] block_ioctl+0xf9/0x140 [ 2270.228665] ? blkdev_read_iter+0x1c0/0x1c0 [ 2270.229637] __x64_sys_ioctl+0x19a/0x210 [ 2270.230559] do_syscall_64+0x33/0x40 [ 2270.231403] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2270.232563] RIP: 0033:0x7ffb287348d7 [ 2270.233407] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2270.237522] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2270.239228] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2270.240841] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2270.242431] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2270.244037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2270.245657] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:47:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x8, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:47:35 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 12:47:35 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x3, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:35 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:35 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) sched_rr_get_interval(r1, 0xfffffffffffffffe) ptrace$cont(0x9, r0, 0x7, 0x7) 12:47:35 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() r4 = getpid() ioprio_get$pid(0x3, r4) getpgid(r4) syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2270.541513] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2270.543514] EXT4-fs (loop1): group descriptors corrupted! [ 2270.550288] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2270.556489] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2270.559719] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2270.594597] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:47:35 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="001b8313a6ab9cac958e287b32d690c94a9e9e063fd94d05ae4b2824c8e7c082b231a0a87929d4724517f05e632926c94beb5ea671340c3c69d1a14d12f4b45999415f22952f0b49f23c19b73f7b137f45bfb0187bc173abeb8f0a6f2364161342b83fefb8e1d589f369b4003d2d4ad98358511186b140db0d96cf13319de6c33a7e5abe4793efbc2a629b60ca0e00"/156]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1f) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000003, r2) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2270.829718] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2270.870487] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:47:49 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 12:47:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x2}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:47:49 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x400, 0x23, 0x4, 0x12, 0x4, 0x876, 0x0, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:49 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 37) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:49 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) r2 = getpid() ioprio_get$pid(0x3, r2) ptrace$cont(0x20, r2, 0x80000000080007, 0x100000005) 12:47:49 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) gettid() process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:47:49 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:49 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 1) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2284.004309] FAULT_INJECTION: forcing a failure. [ 2284.004309] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.006891] CPU: 1 PID: 126132 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2284.007672] FAULT_INJECTION: forcing a failure. [ 2284.007672] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.008332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2284.008377] Call Trace: [ 2284.008403] dump_stack+0x107/0x167 [ 2284.008425] should_fail.cold+0x5/0xa [ 2284.008448] ? __kernfs_new_node+0xd4/0x850 [ 2284.008468] should_failslab+0x5/0x20 [ 2284.008487] kmem_cache_alloc+0x5b/0x360 [ 2284.008512] __kernfs_new_node+0xd4/0x850 [ 2284.008536] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2284.008560] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2284.008581] ? wait_for_completion+0x270/0x270 [ 2284.008603] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2284.008630] kernfs_new_node+0x93/0x120 [ 2284.008656] __kernfs_create_file+0x51/0x350 [ 2284.023408] sysfs_add_file_mode_ns+0x221/0x560 [ 2284.024384] internal_create_group+0x324/0xb30 [ 2284.025321] ? sysfs_remove_group+0x170/0x170 [ 2284.026235] ? lockdep_init_map_type+0x2c7/0x780 [ 2284.027200] ? blk_queue_flag_set+0x22/0x30 [ 2284.028085] ? __loop_update_dio+0x2d2/0x690 [ 2284.028978] loop_configure+0x954/0x1480 [ 2284.029814] lo_ioctl+0xa72/0x1760 [ 2284.030538] ? avc_has_extended_perms+0x7f1/0xec0 [ 2284.031518] ? loop_set_status_old+0x250/0x250 [ 2284.032485] ? avc_ss_reset+0x180/0x180 [ 2284.033303] ? find_held_lock+0x2c/0x110 [ 2284.034140] ? __lock_acquire+0xbb1/0x5b00 [ 2284.035048] ? selinux_inode_getsecctx+0x90/0x90 [ 2284.036029] ? generic_block_fiemap+0x60/0x60 [ 2284.036952] ? loop_set_status_old+0x250/0x250 [ 2284.037876] blkdev_ioctl+0x291/0x710 [ 2284.038658] ? blkdev_common_ioctl+0x1870/0x1870 [ 2284.039624] ? selinux_file_ioctl+0xb1/0x260 [ 2284.040530] block_ioctl+0xf9/0x140 [ 2284.041269] ? blkdev_read_iter+0x1c0/0x1c0 [ 2284.042142] __x64_sys_ioctl+0x19a/0x210 [ 2284.042972] do_syscall_64+0x33/0x40 [ 2284.043734] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2284.044780] RIP: 0033:0x7ffb287348d7 [ 2284.045540] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2284.049262] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2284.050823] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2284.052276] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2284.053717] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2284.055170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2284.056651] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 2284.058136] CPU: 0 PID: 126154 Comm: syz-executor.4 Not tainted 5.10.156 #1 [ 2284.059603] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2284.061328] Call Trace: [ 2284.061882] dump_stack+0x107/0x167 [ 2284.062640] should_fail.cold+0x5/0xa [ 2284.063428] ? __do_sys_memfd_create+0xfb/0x450 [ 2284.064414] should_failslab+0x5/0x20 [ 2284.065206] __kmalloc+0x72/0x3f0 [ 2284.065936] __do_sys_memfd_create+0xfb/0x450 [ 2284.066874] ? ksys_write+0x1a9/0x260 [ 2284.067663] ? memfd_file_seals_ptr+0x170/0x170 [ 2284.068639] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2284.069729] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2284.070808] do_syscall_64+0x33/0x40 [ 2284.071583] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2284.072663] RIP: 0033:0x7f411146fb19 [ 2284.073427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2284.077260] RSP: 002b:00007f410e9e4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2284.078834] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f411146fb19 [ 2284.080325] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f41114c90fb [ 2284.081813] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 2284.083299] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2284.084797] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000180 12:47:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x3}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2284.166143] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2284.168045] EXT4-fs (loop1): group descriptors corrupted! [ 2284.174627] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2284.182543] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:47:49 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 38) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2284.320528] EXT4-fs error (device loop7): ext4_orphan_get:1413: comm syz-executor.7: bad orphan inode 301979167 [ 2284.344751] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2284.349633] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:47:49 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:47:49 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7, 0x3, 0x3f, 0x1, 0x0, 0xe12, 0x1004, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x42, 0x10000, 0x1, 0x5, 0x5e6a, 0xffff, 0x40, 0x0, 0x7fffffff, 0x0, 0x5}, r1, 0xffffffffffffffff, r2, 0xb) 12:47:49 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x4}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:47:49 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r1, 0x0, 0x0) dup2(r1, r0) r2 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000180)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000200)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4000000}}, {@nodiscard}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r2, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2284.453583] FAULT_INJECTION: forcing a failure. [ 2284.453583] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.456345] CPU: 0 PID: 126857 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2284.457873] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2284.459546] Call Trace: [ 2284.460106] dump_stack+0x107/0x167 [ 2284.460847] should_fail.cold+0x5/0xa [ 2284.461614] ? create_object.isra.0+0x3a/0xa20 [ 2284.462536] should_failslab+0x5/0x20 [ 2284.463303] kmem_cache_alloc+0x5b/0x360 12:47:49 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_dev$vcsn(&(0x7f0000000140), 0x7ff, 0x6000) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x2, 0x5, 0x1, 0xff, 0x0, 0xfffffffffffffff9, 0x340a4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x10853, 0x1f, 0x0, 0x3, 0xba09, 0x8, 0x200, 0x0, 0x56}, r1, 0xffffffffffffffff, r2, 0x8) fork() [ 2284.464133] create_object.isra.0+0x3a/0xa20 [ 2284.465118] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2284.466145] kmem_cache_alloc+0x159/0x360 [ 2284.466988] __kernfs_new_node+0xd4/0x850 [ 2284.467825] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2284.468800] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2284.469776] ? wait_for_completion+0x270/0x270 [ 2284.470696] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2284.471765] kernfs_new_node+0x93/0x120 [ 2284.472579] __kernfs_create_file+0x51/0x350 [ 2284.473466] sysfs_add_file_mode_ns+0x221/0x560 [ 2284.474411] internal_create_group+0x324/0xb30 [ 2284.475340] ? sysfs_remove_group+0x170/0x170 [ 2284.476253] ? lockdep_init_map_type+0x2c7/0x780 12:47:49 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffc000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_LOCK(0x0, 0xb) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() r4 = syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0xc0000, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r5, 0xc018937a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01005600010000000ad65b1e48d33d1fde79cadf180000000942bd110b43dc36bda398bcac487bc49016a9cc5e2b16f5e11fdb6904f5cffa07ba2de0adf624c06e005a8a42bc39327aeaa2f3281ffeee06000000000000002d49d079a69c809f7f77edc8a9cb6899a2994fa4d2545643d16a484697f7f3af65654777968a99b4926585458d337a0236f2a0c23817756dd320db38b98deed771f4b675ab394a8839814727be311836a3276392985492b07b78030a4b29759ff2630a5e6f4b2b3ca7687c1f5b2bd8569e6b6e6e4d9e99493edbacd3ce734690a13d61ec5bc517ccbd827d8cf539e93f7ec220463199db51f62d323999a40b6e8e4c30b91e96b401ba072fdb36afcfca70954de47bbd84add91ec68bd75af2e80800000000000000c21e41", @ANYRES32=r4, @ANYBLOB="06002b0547a3f85302995cd39b0000000002002e2f6669df58cadca730000000000a09b682422659f106284467e96e5de8f1d9bb9cb7888cbf1a88134b979148377251d5b66037b90fbbf49496fbdd6a532d9b675d86b64ddc99113cb054ac93c1f4b0e257ba89125d5696d5c83ecb1ff4246582a9f8c09d4e96876a1441103cbcd1bf69cff6f788e0e496a69a6dc8b0fab501000000"]) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) lseek(0xffffffffffffffff, 0x2, 0x3) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2284.477209] ? blk_queue_flag_set+0x22/0x30 [ 2284.478258] ? __loop_update_dio+0x2d2/0x690 [ 2284.479268] loop_configure+0x954/0x1480 [ 2284.480241] lo_ioctl+0xa72/0x1760 [ 2284.481086] ? avc_has_extended_perms+0x7f1/0xec0 [ 2284.482095] ? loop_set_status_old+0x250/0x250 [ 2284.483042] ? avc_ss_reset+0x180/0x180 [ 2284.483863] ? find_held_lock+0x2c/0x110 [ 2284.484721] ? __lock_acquire+0xbb1/0x5b00 [ 2284.485643] ? selinux_inode_getsecctx+0x90/0x90 [ 2284.486615] ? generic_block_fiemap+0x60/0x60 [ 2284.487544] ? loop_set_status_old+0x250/0x250 [ 2284.488509] blkdev_ioctl+0x291/0x710 [ 2284.489296] ? blkdev_common_ioctl+0x1870/0x1870 [ 2284.490277] ? selinux_file_ioctl+0xb1/0x260 [ 2284.491181] block_ioctl+0xf9/0x140 [ 2284.491934] ? blkdev_read_iter+0x1c0/0x1c0 [ 2284.492823] __x64_sys_ioctl+0x19a/0x210 [ 2284.493662] do_syscall_64+0x33/0x40 [ 2284.494424] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2284.495470] RIP: 0033:0x7ffb287348d7 [ 2284.496249] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2284.499998] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2284.501550] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2284.503006] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2284.504482] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2284.506175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2284.507703] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:47:49 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x9, 0x1, 0x8, 0x1, 0x0, 0x6, 0x840, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000200), 0x9}, 0x800, 0x8, 0xb5, 0x7, 0x100000001, 0x0, 0x6, 0x0, 0x1ec, 0x0, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) waitid(0x1, r1, &(0x7f0000000040), 0x8, &(0x7f00000000c0)) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0xe, 0x80000) ptrace$cont(0x9, r0, 0x7, 0x7) 12:47:49 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:49 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) r2 = getpid() ioprio_get$pid(0x3, r2) syz_open_procfs(r2, &(0x7f00000002c0)='net/rfcomm\x00') ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() syz_open_procfs(r4, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r4, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2284.796238] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2284.798106] EXT4-fs (loop1): group descriptors corrupted! 12:47:50 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:47:50 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6800) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f00000001c0)={{0x7, 0xfffffe00}, {0x8}, 0x8, 0x1}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2284.844685] EXT4-fs: failed to create workqueue [ 2284.846179] EXT4-fs (loop4): mount failed 12:47:50 executing program 0: r0 = fork() r1 = fork() ptrace$cont(0x9, r1, 0x2, 0x3) ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) ptrace$setopts(0x4200, r2, 0x5, 0x21) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x7, 0x7) [ 2284.924383] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2284.963220] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:48:04 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:48:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040040}, 0x20040010) r1 = fork() ptrace(0x10, r1) fork() waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r1, 0x7, 0x7) 12:48:04 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 39) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:48:04 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) prlimit64(0x0, 0x7, &(0x7f00000003c0), 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 12:48:04 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x5}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:48:04 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) ioctl$RTC_WIE_ON(r1, 0x700f) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x4}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ioctl$CDROMEJECT_SW(r1, 0x530f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:48:04 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="14000002000000000000006c0000000000000000"], 0x14}}, 0x0) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:48:04 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000080), 0x4) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000280)={'ip_vti0\x00', 0x0, 0x1, 0x80, 0x2, 0x8, {{0x21, 0x4, 0x1, 0x6, 0x84, 0x67, 0x0, 0x8, 0x29, 0x0, @rand_addr=0x64010102, @empty, {[@lsrr={0x83, 0x13, 0xd9, [@local, @loopback, @remote, @private=0xa010100]}, @timestamp_prespec={0x44, 0x14, 0xad, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x101}, {@rand_addr=0x64010100, 0x38c}]}, @lsrr={0x83, 0x17, 0x24, [@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @private=0xa010102]}, @end, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x14, 0x43, 0x3, 0x9, [{@multicast1, 0xfffffffa}, {@multicast2, 0x80000001}]}, @cipso={0x86, 0x17, 0x3, [{0x0, 0x11, "0090c29de3f1a55670234087f3b365"}]}, @noop]}}}}}) bind$packet(r0, &(0x7f0000000180)={0x11, 0xf8, r1, 0x1, 0x3, 0x6, @local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000040)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0xdc, 0x401, 0x26, @mcast2, @mcast1, 0x7, 0x1, 0x3, 0xaa7}}) sendto$packet(r0, &(0x7f00000000c0)="51bc83c65835fc7075611f4fa17174c9eab018d3b959e867c15871d8e4edc6d432633eaa4f73e7a9ef86f6c5da4d8b79cb8ec609633b2aec893a3b42e3eb7af54beec0967a82bbe07a30f84980bd123f51115e8d0bd4d6ce4731f3230975d3318f82f56b01351fd7c2ef910601", 0x6d, 0x8000, &(0x7f00000001c0)={0x11, 0xf8, r2, 0x1, 0x9, 0x6, @broadcast}, 0x14) [ 2299.175107] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2299.216184] FAULT_INJECTION: forcing a failure. [ 2299.216184] name failslab, interval 1, probability 0, space 0, times 0 [ 2299.218795] CPU: 1 PID: 127916 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2299.220249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2299.221980] Call Trace: [ 2299.222535] dump_stack+0x107/0x167 [ 2299.223294] should_fail.cold+0x5/0xa [ 2299.224084] ? __kernfs_new_node+0xd4/0x850 [ 2299.225002] should_failslab+0x5/0x20 [ 2299.225789] kmem_cache_alloc+0x5b/0x360 [ 2299.226642] __kernfs_new_node+0xd4/0x850 [ 2299.227516] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2299.228510] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2299.229511] ? wait_for_completion+0x270/0x270 [ 2299.230460] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2299.231553] kernfs_new_node+0x93/0x120 [ 2299.232395] __kernfs_create_file+0x51/0x350 [ 2299.233328] sysfs_add_file_mode_ns+0x221/0x560 [ 2299.234306] internal_create_group+0x324/0xb30 [ 2299.235264] ? sysfs_remove_group+0x170/0x170 [ 2299.236231] ? lockdep_init_map_type+0x2c7/0x780 [ 2299.237215] ? blk_queue_flag_set+0x22/0x30 [ 2299.238114] ? __loop_update_dio+0x2d2/0x690 [ 2299.239033] loop_configure+0x954/0x1480 [ 2299.239887] lo_ioctl+0xa72/0x1760 [ 2299.240633] ? avc_has_extended_perms+0x7f1/0xec0 [ 2299.241637] ? loop_set_status_old+0x250/0x250 [ 2299.242596] ? avc_ss_reset+0x180/0x180 [ 2299.243422] ? find_held_lock+0x2c/0x110 [ 2299.244286] ? __lock_acquire+0xbb1/0x5b00 [ 2299.245255] ? selinux_inode_getsecctx+0x90/0x90 [ 2299.246239] ? generic_block_fiemap+0x60/0x60 [ 2299.247167] ? trace_print_seq+0x70/0x2a0 [ 2299.248032] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2299.249174] ? loop_set_status_old+0x250/0x250 [ 2299.250121] blkdev_ioctl+0x291/0x710 [ 2299.250915] ? blkdev_common_ioctl+0x1870/0x1870 [ 2299.251902] ? selinux_file_ioctl+0xb1/0x260 [ 2299.252824] block_ioctl+0xf9/0x140 [ 2299.253575] ? blkdev_read_iter+0x1c0/0x1c0 [ 2299.254468] __x64_sys_ioctl+0x19a/0x210 [ 2299.255320] do_syscall_64+0x33/0x40 [ 2299.256090] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2299.257163] RIP: 0033:0x7ffb287348d7 [ 2299.257933] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2299.261778] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2299.263352] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2299.264831] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2299.266317] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2299.267790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2299.269274] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:48:04 executing program 7: creat(0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f0000000140)={0x2000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@access_client}]}}) fork() 12:48:04 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x6}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:48:04 executing program 6: r0 = fork() ptrace(0x10, r0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r2, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) r3 = shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) shmat(r3, &(0x7f0000ffe000/0x2000)=nil, 0x1000) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) r4 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r4, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r5 = fork() r6 = syz_open_procfs(r5, &(0x7f0000000040)='io\x00') ioctl$TIOCMGET(r6, 0x5415, &(0x7f0000000300)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r5, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2299.546820] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2299.553147] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:48:18 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r2, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x11, 0x6, 0x8f6, 0x1, 0x15b}) r3 = dup2(0xffffffffffffffff, r0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="7eea869edd1a6866f2d08fc62f32a000"]) ioctl$FIOCLEX(r0, 0x5451) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './file0\x00'}) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f00000015c0)={0x54, 0x0, &(0x7f0000000540)=[@acquire={0x40046305, 0x2}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x58, 0x18, &(0x7f00000004c0)={@ptr={0x70742a85, 0x1, &(0x7f0000000300)=""/212, 0xd4, 0x2, 0x5}, @flat=@weak_binder={0x77622a85, 0x100, 0x1}, @flat=@binder={0x73622a85, 0x0, 0x1}}, &(0x7f0000000400)={0x0, 0x28, 0x40}}, 0x40}], 0x1000, 0x0, &(0x7f00000005c0)="8b0b7b3e819bcadb11c1dab90b93ad30bfdd249a603328729e455df2a71f70ff124093bfc7e17f552f9d53d1dab804a364f9a92b6912336380acd1a2208c57b85b773bf7912ec184dc38d82dd2bcb85aa283b4cda8ef18963d8a7086dab7530e5be71ec6cb5d022a719679c5e99ec3181a9a1d4367dbd71cef02cdd4cbd18239e86360ded8bd823056d70001b4bbcd418ba8b789f6b626fb8e7e418c3cc1da6d73451f9c5c371f8205bcba6eda9c06f75752e3ea57c5042eac635870a13cdaa383e56dbf8ff916a3d9f7ff0161c7197576965ecbf0c127b01bed6be91f904a880be427659571cf5cfe951548fcece851ee22968ee49b6ba80b1be42e4875c11692bc61d20aeeff1542bbb84cc8482b6f17fd4ff6328393d8dcf3132eb8574409997290857d877312dc9ace45af04861bd93aca72debce6dd9649ef801776cf172e6ca92b3ced05b1eede6ab65da56367baa775bef7f544211bc0833960465af0af565f47d7b3a8634ada88ce83933e06e404f0bfabb6ea098ca92a9093c3a167edff9bb8c1fa70c27b1db37091cdc3197aa57102cf5ba42baa3d005e25d0472a0c7890098edc43b6c6635d75d92d8a9d6ed5e4811824045a330eac9e199ac89ff6ca53c66a0ba21ba1bc37269692f7b98acce995ea787052607ef764e61bfeeeec9b933ea956592cd90aedb832a60be748be7242b4e73ab6dda297121f07e7cc9cd019cf511d64092e2b537aaca31f45c8419d7946b03f508ff2ab248fd0d0c89c565e6fa2ab8c51cb82c7c03c925d48d46f31f916a4e2c9d109cc9bc377221db260dfec957e72fe344586a2198be0b0f7f8c1fa8e1b7e407146acaf5797bbee7235e6f65ac2d055e2f67a8fcd0d7619cdd3f1bf7aff2646a8a8cd30eef392514778c3b7a02a0b1aa7e07a044897660560972a05caf45df06f4cc0d3fde8861f90b69d033191df8063826bd31ade2beaaec04638f9a672804137ea372c2c3ce6848d9bb0df1b4f76f0acd3963dddb3e33a130dbba14127911e6f9002f718cbdf1debaac1526da9c6296080ac20b45d8a97a32589f5cf51e8ab1a962a790d147f2d685bcf79d4694072981171ae25ff3e1f7fba7094554c106c879bf4b78647a22b36012d735c5419478ff40deca846475ffb214f31ca5ca73e376ce750871b682cfbd5c76be501e15ee651c887abc8103f48eec48701277d191873cf17daa1736c59cacce98d30c0fb2a9274f78206d3ecc22c197aed9bac48f62533e61117108c5e596e47ee1202e177ed7c34750e6b8c11eba2748708a2639660927b18ae95720ac267f2d0a64ccfda031d79604f40c7067494f875b2fb41e7bccb1a75cedb400d081deba109bc5bca066ecb6a3221ea744c4766ca25db1f1b3d6759de44a0e3d6cbceb51204a2afd1e021d0bb3146858eee7a1df69853042abfa67d67de690227acb3653886184c088f705804aa835412e973f47e2e9d4f1f362a0c77c5f5087246257c3671edcca4ad3287ae3fd16f14cbeca6e3afb4983ff4db28ea9732e3f239cba58bf636b12cef9e8e5c6f64279f3d89afa69cdf83f5f970d06e7865e058173fe1eb0a55a96c931f7337206ab50ad3107c29ddc0b3a74e2245c84ba32a4a31cfc5063f662f10b662c64459eb7fbe576f132ab7e30cad12b0f45792c0cb6bfd8020e6853de7ea39791d5cc8a68d33055083711017927b895ab5354fc276adfcce57c9ca95f2bb7689d9918f9cae31cd821d12e8b26428fbf4615dbb799aad2ced7272e4ccbc9a1f86ffbfe4a5370ddb96c3130374ef70a5dd0956dac2fc22911f0bfd77fcd670feda84a9528d2a495fa659d8b9c8503640bc9c95ea2f10f0c2c98f43f51f4a23b57307bf5a0009162de867a4c88f5d5ca7a54a538e5cbd19d61e594faad91419ec148f86752ed6087c2f9af773a150485669aba2db9ccc826eb75d18e60e779467a796cfad97e59bc9ab952dfb77dd45614ba5bbda4ba1b737466cd1432550a7b43acb8c0faa9e4c9a629921ae7d9d9cf707eae1ad86e75586c254140b16ca5d769a5cbd68d109ba2f848147649e555aba5154bfcf35005700efdeb4310c4125f081ddbc083b85a3c677bcf376138c17ef5d9af0a11cfb07a015712f14c92a52a5306970c9488b854fa0757a1448631d2c9b9ead5556b0f975ce66695fd24ef28e1e3d5996a1c871b78a95bef8b8e4923b184f5384939a32664b486294149256a50b26cfb6d5a45d372993b41f153a878a0e514c5f3dd7d5e5e3fa6b4778613d7e77607b9914ebab93f315f2a3af03d3bf6a7c6df0785683bbe167210fbfa9e0b8af6d56262fafb6f662368cb6362eaebf731e5cc5b6092bc045e2061bc81c8b77e9fae58c49606da3de2a1c85dc654482dd2563bff29dd7173fed8f585fa98d3a85635946d42524de3568f0f38f0bc3ce4609d422482a20f911708c9d0e0be97a2e89752a853fd3687c19bb74e4b38f48364a295f3386b6728b7efb59a5244279b5a2f4dc21da5376b340281221773c029987fc3195b488067087fab7fc329d974af76654e28ab54af93f7780f24ed84d43538c1c0c4ec5400f535f53eb745b1b15aadfef33c568b5845e3015f93d8e4b0669e2485082d04ba99b7780dbaf5a0d89ce36f2964bb26ca8f6fee036e8061a88ce3a3e96367dcb9ff08cef791f02ae4413cefa1ac1b52915ba21e960f6e99c54445885361f727f85a52bab0059e321c732785dcecc371427e9ab967825c430c13c89424a62368bfd2dd4f59af5525811639b9295fb1906b2366131a9a800f6e6283ff6125693dc3c4e4fff6b24736a6516b76b08e4f3cc8f3f6c037a536d3420e963c0cb3c7719d54e5ce1c48c68ca14c259d4fd8020190cad2c79f7411b4a63974f7ac3766115cbc74c3edd7feed75f56efcd3a4fe30d88b7eb990d57edefeb0ac79b543a8aa528ad7184c2183e592bff5cc8a1af143cfd02c973df0263b9b6064bfbeb3a657e26b373fa3f4ce2beb577322ad4d6d270c023b0bfe4f8dcf5ac37238ca290c081d21255d12e29772558e264db0707ee08605de945d30b5b1bfd979861954d280171784f367cb79bf4c323fa2d2994579b1239c441e688e3f2731492b634a4b11b0f933023f7b6a33c913dd69d2df6f629a1efd084f86eb4bcd47f5313e818b7fb6ed34620da8961af643c4e6ea5c84df512c804852e19e3e789c2db6d7533a439af955a342005ca572f0576ac2139e05543f1d33846090e45f077814c71d5975f079c058c23847ca1aebddd24a0e855967ebcbbdb4aa04d34e0347938f85a49f57d1454faa5f6d11c7860344ddb27a307bee4215638516074a3545f904e5822a0bbf95c6f97227c195babe36dd63eb118be4fc694717c4f7b45b1a8c8de5cdc42f7bbdbadf2828f27ed138b061658dbb9c04a93481f0677ba79e4fe712acc47fd5bc0b0d4ba2e2771c5dd87cb26fe03ac5fa28d48730a02a25da66c4bb0f9df003789baa0f041966dc1a9062901e7105a110d73670cfed02b0acc7c6cd4abc2951a2ede4aa3fa1cf9cfa37a6ed49e42ccb590bca617c326b5f3bdc2858e1748d29b3e7404df123bab1a0220aa39ad48cc225a2bd359e4368b94b847c00e57c5de8318e66d2d986120a88b0917488adc4a9668cdae34237b63caedb3ef7b33c491e4cebc26ffbe0bb34b979f811ceb27d834ea18cf4d132bf105db210089524178551bc6e6e3a01c7437fd285c106e712e4de77253b1b36de0b0ab25a6e337537de00a8ea3136053aed2357fe217c26964fae354e904e0717b31b5afdf41a1fd046732ce55605e60a2bad6ada0213f0945ff253490d71ee8de7711d972068c7c2a60d29ccd9555c8b71990d040218369a024e8499e98cd3742a4e536a8bac268e36d67dea2918323290d6ea88374c2b322f20373b255ff161a90670510bbfd9fb34504c7385db2b8e9d9eeeaeb1ae5b35a0c607f5b8cc304aebfacb8544eebc8575f537e238afd20c8c96a5575b7058166ce539ddfdbe255369ffb9ef12fff864a1ddc89a73895d2dfa0185c58b8c829d75ae854ea3fe3a59476260515b5c124d66e8f1e38d5176a5af77c88423a6aa8846928540ceff1e60decb94a9931a8ce78cb537395d82d551b9d8dcfc58e38ced2399be6d943619434e24b6e773d61b8e7784fddf9e0d6fceadc66028a07e4a8bce8888907a7c0d303f71966fbf943dfc43e5c95cbb3533743895a7eafb0b7a43b7a27670e49e4d10e68c158af9dfec6615bff953b2028f4245530eb4d01957c282d00affea8083e9d0d0ce0d24fbcc00fe3a3d82ee17d70dbf718332c0ebfa9ff56d34d3a426055169046399be5f9e6ebe4c600709c2230c658c5d5ba3c5f46da64d3bb8b215b282a9445d72a21799a9b94ad9d40daf7db25da1a69738f71cc3bdbd983a06b5f4bc69d629eea70009bc516ceed33fc7a8ebf9796d03fc3fd8d47319a63781d0ca3fe123f3d979aff492b9d509681a551128e98f5d092240df264e19802a7b854911f08507d4af953cab2a1f6c2e6974e14dfcb82cd8a63653aedd1911e2b0d0bc801c5fe678cdd485cfed7af6f6ca8c4350a011f76776a6a722dacb0af467f2033e7efaf0162e70434844608ca7a6e9c92a343e7a470720662c045b0e99a1b92a326d9040f2ceeff99e35bfc560f5c09abf973baac01115901c0351734af4cc95be7ecd08a39b88be90ad2f3a0e2900b176ea761875b1e4f9a0ad32d65993ed365d4ab8e6e8f7ca442b34143754c0f458435993dc84becd49c8d9f085ff340f0116c8ddf2a25702f251140a212e153244925b4884eb8d0235ba72595297af601294e6c50eb1f2a8c54ed9bb0bded753dd46d6968b5f49c1b66177f3a2f7164fa88b28a37e70092ab5810416a403b3d8b34313765a93513222b249bf5e002ca3de38b06d198824c873ca87cf0c9f4427766bf7e4e40a1f785cdc6262bbc5f5e8ed122c34bb9a71f38e33d811f468874d43cd174be75909ab5d76e202de20edb03d075efb25ee2d22aeedb0f22aac971177c808cdc8f171097bb826ce404fdd02f0da212d9b6a544f11e3f1ccae3e702830de5426b803bf05cc764313901eac66219803000102459e4b0f50a696886c132f8bb0596db7025f8cd70b4f0421e554ee29241790f1807ade47f3178364071b0cc0984c00c39e51a2f7ce58ddd5441a83bd96ced2333b2b60e3f6d2506c69d27c78214410a287e7166b9c0563cdf489e6869b24092d66d37b7fac41d7b0a69401f63ccf4ab77715ee634e9c50aac9b8952d194d64f1a36aee741f28829dd7d59fd7b22d7105b80d9cf6d42e069e700e67578ffbbe5dba040b06b16bdad61b1701c691893dedeb5129dc4d684c7ffdc05f34522f2096ee464687864e3137a5defe39cf7bc3dc1470c18bf6c2e4db7d53919427ef4686c5f6d959331db50acc1063a0ec288512010b71fcaf0cc116308366bfc9443cd683f25e10d6cfbb3708659065d68d571832bbba5f5a6f30484186559d2bf14c3ca6fbedb286d0aff9f270147554dee7b2172096d19976527820acd98b9d90ff9c4c4cf24026f856f6e605916e23af34842824cc0e26dd2bf449902fc721083d186ccc124a7fd36a34b24ccd302a67b8c7fab0ac457022410bbfa7bacad43f71a1ca6977026d7fca65dd0e4ae0659e28e203d92550dd71c0320dea6a769cb0ef73be7d5c66b1e00cddf24d453dfe1b4af81f6075730a5462f125c3a23a7a1ff9470890e22de2f16bf048b10372baacb271c910f88036e45e5deb7417bea6d8f3f8949"}) ftruncate(r5, 0x1) ioctl$sock_SIOCADDDLCI(r3, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000140)) 12:48:18 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4524, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0, 0x2}, 0x10a0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x73fad0bd, 0x0, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x5453, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x5453, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='comm\x00') 12:48:18 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() recvmsg$unix(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/102, 0x66}, {&(0x7f0000000740)=""/122, 0x7a}], 0x2, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}, 0x101) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:48:18 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) dup(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0xffffffffffffffff) 12:48:18 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 40) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:48:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x7}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:48:18 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:48:18 executing program 0: r0 = fork() r1 = getpid() ioprio_get$pid(0x3, r1) sched_rr_get_interval(r1, &(0x7f0000001040)) ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x8000) ptrace$setregset(0x4205, r0, 0x204, &(0x7f0000001000)={&(0x7f0000000000)="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", 0x1000}) [ 2313.468431] FAULT_INJECTION: forcing a failure. [ 2313.468431] name failslab, interval 1, probability 0, space 0, times 0 [ 2313.471122] CPU: 1 PID: 128758 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2313.472605] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2313.474308] Call Trace: [ 2313.474866] dump_stack+0x107/0x167 [ 2313.475620] should_fail.cold+0x5/0xa [ 2313.476416] ? create_object.isra.0+0x3a/0xa20 [ 2313.477362] should_failslab+0x5/0x20 [ 2313.478155] kmem_cache_alloc+0x5b/0x360 [ 2313.479021] create_object.isra.0+0x3a/0xa20 [ 2313.479947] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2313.481248] kmem_cache_alloc+0x159/0x360 [ 2313.482347] __kernfs_new_node+0xd4/0x850 [ 2313.483439] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2313.484702] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2313.485953] ? wait_for_completion+0x270/0x270 [ 2313.487144] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2313.488537] kernfs_new_node+0x93/0x120 [ 2313.489584] __kernfs_create_file+0x51/0x350 [ 2313.490533] sysfs_add_file_mode_ns+0x221/0x560 [ 2313.491644] internal_create_group+0x324/0xb30 [ 2313.492800] ? sysfs_remove_group+0x170/0x170 [ 2313.493953] ? lockdep_init_map_type+0x2c7/0x780 [ 2313.495161] ? blk_queue_flag_set+0x22/0x30 [ 2313.496257] ? __loop_update_dio+0x2d2/0x690 [ 2313.497396] loop_configure+0x954/0x1480 [ 2313.498448] lo_ioctl+0xa72/0x1760 [ 2313.499350] ? avc_has_extended_perms+0x7f1/0xec0 [ 2313.500594] ? loop_set_status_old+0x250/0x250 [ 2313.501772] ? avc_ss_reset+0x180/0x180 [ 2313.502798] ? find_held_lock+0x2c/0x110 [ 2313.503876] ? __lock_acquire+0xbb1/0x5b00 [ 2313.504936] ? selinux_inode_getsecctx+0x90/0x90 [ 2313.505928] ? generic_block_fiemap+0x60/0x60 [ 2313.507083] ? loop_set_status_old+0x250/0x250 [ 2313.508314] blkdev_ioctl+0x291/0x710 [ 2313.509310] ? blkdev_common_ioctl+0x1870/0x1870 [ 2313.510579] ? selinux_file_ioctl+0xb1/0x260 [ 2313.511709] block_ioctl+0xf9/0x140 [ 2313.512605] ? blkdev_read_iter+0x1c0/0x1c0 [ 2313.513498] __x64_sys_ioctl+0x19a/0x210 [ 2313.514342] do_syscall_64+0x33/0x40 [ 2313.515117] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2313.516176] RIP: 0033:0x7ffb287348d7 [ 2313.516970] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2313.520750] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2313.522307] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2313.523765] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2313.525233] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2313.526689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2313.528143] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:48:18 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4524, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0, 0x2}, 0x10a0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x73fad0bd, 0x0, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x5453, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x5453, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='comm\x00') 12:48:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x8}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:48:18 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r2, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x1, 0x4, 0x7f, 0x3d3dad9c, 0xfffffffa}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r3, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:48:18 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2313.680396] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 12:48:18 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) [ 2313.753350] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2313.841738] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2313.852762] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2313.964656] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 2313.971003] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 12:48:32 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x4000000, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x108) 12:48:32 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) waitid(0x0, r1, &(0x7f0000000040), 0x1, &(0x7f00000000c0)) ptrace$cont(0x9, r0, 0xffffffffffffffff, 0x7) 12:48:32 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x14403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:48:32 executing program 6: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000008c0)={"d3772fe891c2255c851c417cc9de0443", 0x0, 0x0, {0xfffffffffffffff9, 0x6}, {0x10001, 0x9}, 0x1, [0xfffffffffffffff7, 0x101, 0x7, 0x1f, 0xffffffff, 0x401, 0x3ff, 0x8001, 0x3f, 0x81, 0x58dc, 0x401, 0x2, 0x1, 0x5, 0xbc96]}) r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() ptrace$setsig(0x4203, 0x0, 0x1000, &(0x7f00000006c0)={0x4, 0x80, 0x3}) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r2, 0x200, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) wait4(r1, &(0x7f00000002c0), 0x2, 0x0) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r4 = fork() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x20, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r4, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) 12:48:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x9}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:48:32 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 41) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:48:32 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0x49}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="06255ee0e94ecb3e47d967c42cb86ebd12d141171503443ffee569b770ffa6a316d8af9af9eac38a26e395e7a0e8f7f013b0271570a6d19dfd01dc297e999b00721240a5cfd19e0af52a0d76ee2f9a27e7790196db5ad41a7a871522bf5df4c3b42ea27b2d18d89766c061a194034c114b4549e6233dd20ef93771279f54b764424fc1a1abfe0754ccd5ed74e991f3f8241d085d4d33ba8f663839d400c87ae6d7bb910cf060b3433cbb7665dc68285e9c11c6cecb110bea"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r2, 0x7, &(0x7f0000000180)=r3, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:48:32 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2327.123215] EXT4-fs (loop3): Unrecognized mount option "%^àéNË>GÙgÄ" or missing value [ 2327.129438] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 2327.130824] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2327.152644] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2327.155391] FAULT_INJECTION: forcing a failure. [ 2327.155391] name failslab, interval 1, probability 0, space 0, times 0 [ 2327.158361] CPU: 1 PID: 129718 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2327.159934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2327.161791] Call Trace: [ 2327.162370] dump_stack+0x107/0x167 [ 2327.163177] should_fail.cold+0x5/0xa [ 2327.164020] ? __kernfs_new_node+0xd4/0x850 [ 2327.164997] should_failslab+0x5/0x20 [ 2327.165833] kmem_cache_alloc+0x5b/0x360 [ 2327.166740] __kernfs_new_node+0xd4/0x850 [ 2327.167669] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2327.168733] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2327.169801] ? wait_for_completion+0x270/0x270 [ 2327.170810] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2327.171986] kernfs_new_node+0x93/0x120 [ 2327.172908] __kernfs_create_file+0x51/0x350 [ 2327.173877] sysfs_add_file_mode_ns+0x221/0x560 [ 2327.174925] internal_create_group+0x324/0xb30 [ 2327.175950] ? sysfs_remove_group+0x170/0x170 [ 2327.176967] ? lockdep_init_map_type+0x2c7/0x780 [ 2327.178020] ? blk_queue_flag_set+0x22/0x30 [ 2327.178982] ? __loop_update_dio+0x2d2/0x690 [ 2327.179956] loop_configure+0x954/0x1480 [ 2327.180868] lo_ioctl+0xa72/0x1760 12:48:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0xf}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2327.181642] ? avc_has_extended_perms+0x7f1/0xec0 [ 2327.182869] ? loop_set_status_old+0x250/0x250 [ 2327.183884] ? avc_ss_reset+0x180/0x180 [ 2327.184781] ? find_held_lock+0x2c/0x110 [ 2327.185689] ? __lock_acquire+0xbb1/0x5b00 [ 2327.186667] ? selinux_inode_getsecctx+0x90/0x90 [ 2327.187704] ? generic_block_fiemap+0x60/0x60 [ 2327.188699] ? loop_set_status_old+0x250/0x250 [ 2327.189704] blkdev_ioctl+0x291/0x710 [ 2327.190548] ? blkdev_common_ioctl+0x1870/0x1870 [ 2327.191604] ? selinux_file_ioctl+0xb1/0x260 [ 2327.192586] block_ioctl+0xf9/0x140 [ 2327.193384] ? blkdev_read_iter+0x1c0/0x1c0 [ 2327.194332] __x64_sys_ioctl+0x19a/0x210 [ 2327.195225] do_syscall_64+0x33/0x40 [ 2327.196050] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2327.197182] RIP: 0033:0x7ffb287348d7 [ 2327.198004] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2327.201985] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2327.203638] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 12:48:32 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0x3, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x80401, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff0000/0x4000)=nil, 0x4000, 0x1000006, 0x110, r2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="89"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000300)={0x32, 0x3b, 0xe, 0x1d, 0x3, 0x1, 0x3, 0x49}) ioctl$RTC_AIE_ON(r1, 0x7001) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r4, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/2224], 0x8ba) ftruncate(r3, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2327.205216] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2327.207001] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2327.208572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2327.210148] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 12:48:32 executing program 0: r0 = fork() ptrace(0x10, r0) r1 = fork() ptrace$setregs(0xd, r1, 0x5, &(0x7f0000000000)="a7b2e52546d14d87ef2be1d99c9da66c694f1b6502e3713868fed7bb684b8bdb5072dbbcd3a1d5c840") waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) ptrace(0x4208, 0x0) 12:48:32 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x24, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x4fd, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x5, 0x0, 0x0, @uid=0xee01}]}, 0x24}}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) 12:48:32 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e9", 0x91, 0x4e0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 2327.344721] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2327.346365] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:48:32 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 42) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2327.404345] FAULT_INJECTION: forcing a failure. [ 2327.404345] name failslab, interval 1, probability 0, space 0, times 0 [ 2327.405695] CPU: 0 PID: 130448 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2327.406457] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2327.407355] Call Trace: [ 2327.407648] dump_stack+0x107/0x167 [ 2327.408056] should_fail.cold+0x5/0xa [ 2327.408478] ? create_object.isra.0+0x3a/0xa20 [ 2327.408985] should_failslab+0x5/0x20 [ 2327.409401] kmem_cache_alloc+0x5b/0x360 [ 2327.409844] create_object.isra.0+0x3a/0xa20 [ 2327.410320] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2327.410873] kmem_cache_alloc+0x159/0x360 [ 2327.411326] __kernfs_new_node+0xd4/0x850 [ 2327.411781] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2327.412296] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2327.412824] ? wait_for_completion+0x270/0x270 [ 2327.413317] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2327.413889] kernfs_new_node+0x93/0x120 [ 2327.414325] __kernfs_create_file+0x51/0x350 [ 2327.414802] sysfs_add_file_mode_ns+0x221/0x560 [ 2327.415315] internal_create_group+0x324/0xb30 [ 2327.415812] ? sysfs_remove_group+0x170/0x170 [ 2327.416297] ? __loop_update_dio+0x1b/0x690 [ 2327.416777] ? __loop_update_dio+0x482/0x690 [ 2327.417252] ? __loop_update_dio+0x2d2/0x690 [ 2327.417728] loop_configure+0x954/0x1480 [ 2327.418180] lo_ioctl+0xa72/0x1760 [ 2327.418564] ? avc_has_extended_perms+0x7f1/0xec0 [ 2327.419081] ? loop_set_status_old+0x250/0x250 [ 2327.419581] ? avc_ss_reset+0x180/0x180 [ 2327.420013] ? find_held_lock+0x2c/0x110 [ 2327.420455] ? __lock_acquire+0xbb1/0x5b00 [ 2327.420941] ? selinux_inode_getsecctx+0x90/0x90 [ 2327.421453] ? generic_block_fiemap+0x60/0x60 [ 2327.421944] ? loop_set_status_old+0x250/0x250 [ 2327.422439] blkdev_ioctl+0x291/0x710 [ 2327.422853] ? blkdev_common_ioctl+0x1870/0x1870 [ 2327.423373] ? selinux_file_ioctl+0xb1/0x260 [ 2327.423855] block_ioctl+0xf9/0x140 [ 2327.424246] ? blkdev_read_iter+0x1c0/0x1c0 [ 2327.424740] __x64_sys_ioctl+0x19a/0x210 [ 2327.425181] do_syscall_64+0x33/0x40 [ 2327.425589] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2327.426140] RIP: 0033:0x7ffb287348d7 [ 2327.426552] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2327.428536] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2327.429387] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2327.430161] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2327.430949] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2327.431731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2327.432513] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 2327.544870] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 2327.605320] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2327.611225] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 12:48:44 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 43) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:48:44 executing program 0: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x7, 0x7) ptrace(0x11, r0) 12:48:44 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:48:44 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x46842, 0x0) io_setup(0x5, &(0x7f0000000080)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r4 = syz_io_uring_setup(0x3de4, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) fsync(r5) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000140)={0x1f, 0x9, 0x3ff}) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/514]) io_uring_enter(r4, 0x76d3, 0x0, 0x0, 0x0, 0x0) r6 = gettid() ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000280)={'\x00', 0x40, 0x797a, 0x5c40, 0x10000, 0x5, r6}) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000240)) 12:48:44 executing program 6: r0 = fork() ptrace(0x10, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r3 = fork() syz_open_procfs(r3, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000016c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x1, r3, &(0x7f0000000240), 0x1, &(0x7f00000003c0)) r4 = getpid() ioprio_get$pid(0x3, r4) process_vm_readv(r4, &(0x7f0000000b00)=[{&(0x7f00000002c0)=""/111, 0x6f}, {&(0x7f00000006c0)=""/182, 0xb6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000780)=""/212, 0xd4}, {&(0x7f0000000880)=""/125, 0x7d}, {&(0x7f0000000900)=""/82, 0x52}, {&(0x7f0000000980)=""/18, 0x12}, {&(0x7f00000009c0)=""/121, 0x79}, {&(0x7f0000000a40)=""/8, 0x8}, {&(0x7f0000000a80)=""/68, 0x44}], 0xa, &(0x7f0000000c00)=[{&(0x7f0000000bc0)}], 0x1, 0x0) 12:48:44 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0xf0}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:48:44 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="10"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r3 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r3) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, r3) pkey_mprotect(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x69f2891c8bd5ed95, r2) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:48:44 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fchown(r3, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000140)={0x1e2, 0x98, 0x101, 0x40, 0x3}) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 2339.691590] FAULT_INJECTION: forcing a failure. [ 2339.691590] name failslab, interval 1, probability 0, space 0, times 0 [ 2339.693472] CPU: 1 PID: 130668 Comm: syz-executor.2 Not tainted 5.10.156 #1 [ 2339.694275] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2339.695224] Call Trace: [ 2339.695540] dump_stack+0x107/0x167 [ 2339.695955] should_fail.cold+0x5/0xa [ 2339.696391] ? __kernfs_new_node+0xd4/0x850 [ 2339.696892] should_failslab+0x5/0x20 [ 2339.697346] kmem_cache_alloc+0x5b/0x360 [ 2339.697838] __kernfs_new_node+0xd4/0x850 [ 2339.698323] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2339.698867] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2339.699418] ? wait_for_completion+0x270/0x270 [ 2339.699943] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 2339.700548] kernfs_new_node+0x93/0x120 [ 2339.701040] __kernfs_create_file+0x51/0x350 [ 2339.701568] sysfs_add_file_mode_ns+0x221/0x560 [ 2339.702140] internal_create_group+0x324/0xb30 [ 2339.702689] ? sysfs_remove_group+0x170/0x170 [ 2339.703210] ? lockdep_init_map_type+0x2c7/0x780 [ 2339.703785] ? blk_queue_flag_set+0x22/0x30 [ 2339.704296] ? __loop_update_dio+0x2d2/0x690 [ 2339.704806] loop_configure+0x954/0x1480 [ 2339.705291] lo_ioctl+0xa72/0x1760 [ 2339.705717] ? avc_has_extended_perms+0x7f1/0xec0 [ 2339.706290] ? loop_set_status_old+0x250/0x250 [ 2339.706837] ? avc_ss_reset+0x180/0x180 [ 2339.707293] ? find_held_lock+0x2c/0x110 [ 2339.707759] ? __lock_acquire+0xbb1/0x5b00 [ 2339.708269] ? selinux_inode_getsecctx+0x90/0x90 [ 2339.708803] ? generic_block_fiemap+0x60/0x60 [ 2339.709315] ? loop_set_status_old+0x250/0x250 [ 2339.709828] blkdev_ioctl+0x291/0x710 [ 2339.710264] ? blkdev_common_ioctl+0x1870/0x1870 [ 2339.710814] ? selinux_file_ioctl+0xb1/0x260 [ 2339.711328] block_ioctl+0xf9/0x140 [ 2339.711741] ? blkdev_read_iter+0x1c0/0x1c0 [ 2339.712258] __x64_sys_ioctl+0x19a/0x210 [ 2339.712748] do_syscall_64+0x33/0x40 [ 2339.713175] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2339.713745] RIP: 0033:0x7ffb287348d7 [ 2339.714182] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2339.716330] RSP: 002b:00007ffb25ca9f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2339.717234] RAX: ffffffffffffffda RBX: 00007ffb2877e970 RCX: 00007ffb287348d7 [ 2339.718088] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2339.718921] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 2339.719754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2339.720589] R13: 0000000000000005 R14: 00000000200004b8 R15: 0000000000000005 [ 2339.722765] EXT4-fs (loop3): Unrecognized mount option "" or missing value [ 2339.759459] EXT4-fs: failed to create workqueue [ 2339.760323] EXT4-fs (loop4): mount failed [ 2339.774215] EXT4-fs error (device loop2): ext4_orphan_get:1413: comm syz-executor.2: bad orphan inode 301979167 [ 2339.780235] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2339.783141] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 12:48:44 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x300}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) 12:48:45 executing program 6: r0 = fork() ptrace(0x10, r0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x0, 0x3, 0x9, 0x8000, 0x3, 0x3, 0x5772, 0x30c, 0x40, 0x1cc, 0xaf5, 0x3, 0x38, 0x1, 0x781, 0xc6a, 0x5}, [{0x474e554, 0x931, 0x8, 0x1, 0x3, 0x6, 0x0, 0x7}, {0x3, 0x6, 0x1, 0x2, 0x81, 0x5, 0x1}], "1270c963f3a8a67cb6c1441626afc421e3a992fb833a7585497856d1eedbd43dad3954286114a5c14c057e0bb6f6716f857ed36d6afef855188a8dbec92d01ea9a8e1b6fee720be2710721b51513593bd1d795a3edc9e92c73ca2392abeda8a8b49008652c38d55adc04ca8ef0908630112dc7a800de7cb3180d4d6555cf39cc9708c8f706636cb51ae42dfadeb779dfb78a7f4dc083ec4b716d68aa7bfcc7dc6b09abc39dea57f4043dfbdab36e8e7064f92773", ['\x00']}, 0x264) shmget$private(0x0, 0x2000, 0x67ee2a2ef4becc53, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0xd, 0x7, 0x2, 0x80, 0x0, 0x1, 0x10041, 0xb, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x1, 0x4}, 0x0, 0xffffffffffff8000, 0xc7, 0x7, 0x11f, 0x7, 0x6, 0x0, 0x8, 0x0, 0x4}, r0, 0x3, r1, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$getregset(0x4204, r3, 0x2, &(0x7f00000005c0)={&(0x7f00000004c0)=""/202, 0xca}) shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) r4 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r4, &(0x7f0000ffa000/0x2000)=nil, 0x4000) r5 = fork() syz_open_procfs(r5, &(0x7f0000000040)='io\x00') stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000740)) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000340)={0x2c, 0x7ff, 0x4f0}) statx(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x6000, 0x10, &(0x7f00000007c0)) process_vm_readv(r0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000100)=""/196, 0xc4}], 0x2, 0x0) waitid(0x2, r2, &(0x7f0000000240), 0x80000000, &(0x7f00000003c0)) 12:48:45 executing program 0: fork() r0 = getpid() ioprio_get$pid(0x3, r0) ptrace(0x11, r0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() ptrace$cont(0x7, r1, 0x4000000000000007, 0x7) 12:48:45 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) r1 = dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994", 0x92, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) (fail_nth: 44) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) 12:48:45 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 12:48:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x60, r2, 0x6102aef43b4351b, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback={0x480}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:object_r:shadow_t:s0\x00'}]}, 0x60}}, 0x0) [ 2342.338341] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2342.339727] CPU: 1 PID: 257 Comm: syz-fuzzer Not tainted 5.10.156 #1 [ 2342.340417] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2342.341309] Call Trace: [ 2342.341606] dump_stack+0x107/0x167 [ 2342.342002] dump_header+0x106/0x613 [ 2342.342412] oom_kill_process.cold+0x10/0x15 [ 2342.342890] out_of_memory+0x110f/0x1410 [ 2342.343329] ? oom_killer_disable+0x280/0x280 [ 2342.343811] ? mutex_trylock+0x237/0x2b0 [ 2342.344263] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2220 [ 2342.344912] __alloc_pages_slowpath.constprop.0+0x1bf3/0x2220 [ 2342.345568] ? lock_acquire+0x117/0x490 [ 2342.346003] ? warn_alloc+0x190/0x190 [ 2342.346435] __alloc_pages_nodemask+0x553/0x680 [ 2342.346949] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2342.347603] ? xas_load+0x66/0x2c0 [ 2342.347992] ? find_get_entry+0x2d9/0x6e0 [ 2342.348449] alloc_pages_current+0x187/0x280 [ 2342.348929] __page_cache_alloc+0x2d2/0x360 [ 2342.349397] pagecache_get_page+0x2c7/0xc80 [ 2342.349874] filemap_fault+0x177d/0x21b0 [ 2342.350314] ? read_cache_page_gfp+0x30/0x30 [ 2342.350803] ? replace_page_cache_page+0x1200/0x1200 [ 2342.351346] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 2342.351918] ext4_filemap_fault+0x87/0xc0 [ 2342.352360] __do_fault+0x113/0x410 [ 2342.352790] handle_mm_fault+0x1e72/0x3520 [ 2342.353260] ? _copy_from_user+0xfb/0x1b0 [ 2342.353711] ? __pmd_alloc+0x5e0/0x5e0 [ 2342.354134] ? vmacache_find+0x55/0x2a0 [ 2342.354580] do_user_addr_fault+0x56e/0xc00 [ 2342.355062] exc_page_fault+0xa2/0x1a0 [ 2342.355491] ? asm_exc_page_fault+0x8/0x30 [ 2342.355962] asm_exc_page_fault+0x1e/0x30 [ 2342.356406] RIP: 0033:0x455913 [ 2342.356763] Code: Unable to access opcode bytes at RIP 0x4558e9. [ 2342.357425] RSP: 002b:000000c01275b9d0 EFLAGS: 00010202 [ 2342.357998] RAX: 0000022151b472d7 RBX: 000000c000030700 RCX: 0000000000000018 [ 2342.358786] RDX: 0000000007a076d7 RSI: 000000c00003bfc0 RDI: 0000000000000001 [ 2342.359569] RBP: 000000c01275b9d8 R08: 0000000000000926 R09: 00007fffddd35080 [ 2342.360352] R10: 00007fffddd35090 R11: 0000000000428d48 R12: 000000c01275bb00 [ 2342.361159] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000039 [ 2342.362002] Mem-Info: [ 2342.362290] active_anon:6410 inactive_anon:54133 isolated_anon:0 [ 2342.362290] active_file:357 inactive_file:333 isolated_file:0 [ 2342.362290] unevictable:0 dirty:0 writeback:0 [ 2342.362290] slab_reclaimable:8933 slab_unreclaimable:64463 [ 2342.362290] mapped:69731 shmem:97 pagetables:5985 bounce:0 [ 2342.362290] free:2942 free_pcp:36 free_cma:0 [ 2342.365704] Node 0 active_anon:25640kB inactive_anon:216532kB active_file:1428kB inactive_file:1332kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278924kB dirty:0kB writeback:0kB shmem:388kB writeback_tmp:0kB kernel_stack:9472kB all_unreclaimable? no [ 2342.368255] Node 0 DMA free:6520kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2342.371052] lowmem_reserve[]: 0 1618 1618 1618 [ 2342.371570] Node 0 DMA32 free:5248kB min:7168kB low:8824kB high:10480kB reserved_highatomic:0KB active_anon:25640kB inactive_anon:216532kB active_file:1356kB inactive_file:1940kB unevictable:0kB writepending:0kB present:2080640kB managed:1662796kB mlocked:0kB pagetables:23940kB bounce:0kB free_pcp:380kB local_pcp:0kB free_cma:0kB [ 2342.374693] lowmem_reserve[]: 0 0 0 0 [ 2342.375156] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6520kB [ 2342.376740] Node 0 DMA32: 762*4kB (UME) 147*8kB (UM) 42*16kB (UME) 11*32kB (UM) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5312kB [ 2342.378310] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2342.379228] 794 total pagecache pages [ 2342.379633] 0 pages in swap cache [ 2342.380023] Swap cache stats: add 0, delete 0, find 0/0 [ 2342.380606] Free swap = 0kB [ 2342.380972] Total swap = 0kB [ 2342.381299] 524158 pages RAM [ 2342.381627] 0 pages HighMem/MovableOnly [ 2342.382079] 104482 pages reserved [ 2342.382494] Unreclaimable slab info: [ 2342.383163] Name Used Total [ 2342.383788] pid_2 486KB 543KB [ 2342.384392] p9_req_t 8KB 8KB [ 2342.385012] fib6_nodes 28KB 28KB [ 2342.385591] ip6_dst_cache 45KB 45KB [ 2342.386181] PINGv6 31KB 31KB [ 2342.386759] RAWv6 157KB 157KB [ 2342.387359] UDPLITEv6 62KB 62KB [ 2342.387956] UDPv6 62KB 62KB [ 2342.388554] tw_sock_TCPv6 7KB 7KB [ 2342.389157] TCPv6 62KB 62KB [ 2342.389768] scsi_sense_cache 8KB 8KB [ 2342.390371] sd_ext_cdb 3KB 3KB [ 2342.390972] virtio_scsi_cmd 16KB 16KB [ 2342.391576] sgpool-128 59KB 59KB [ 2342.392176] sgpool-64 63KB 63KB [ 2342.392762] sgpool-32 78KB 78KB [ 2342.393375] sgpool-16 52KB 52KB [ 2342.393978] sgpool-8 52KB 52KB [ 2342.394559] mqueue_inode_cache 62KB 62KB [ 2342.395176] nfs_commit_data 15KB 15KB [ 2342.395762] nfs_write_data 47KB 47KB [ 2342.396376] jbd2_inode 7KB 7KB [ 2342.397000] ext4_system_zone 7KB 7KB [ 2342.397572] ext4_io_end_vec 7KB 7KB [ 2342.398174] ext4_bio_post_read_ctx 15KB 15KB [ 2342.398834] io_kiocb 11KB 11KB [ 2342.399420] kioctx 31KB 31KB [ 2342.400023] aio_kiocb 7KB 7KB [ 2342.400611] dio 15KB 15KB [ 2342.401212] bio-2 4KB 4KB [ 2342.401807] pid_namespace 7KB 7KB [ 2342.402417] posix_timers_cache 7KB 7KB [ 2342.403037] rpc_buffers 31KB 31KB [ 2342.403622] rpc_tasks 3KB 3KB [ 2342.404219] UNIX 261KB 310KB [ 2342.404810] tcp_bind_bucket 8KB 8KB [ 2342.405437] xfrm_state 32KB 32KB [ 2342.406039] ip_fib_trie 8KB 8KB [ 2342.406624] ip_fib_alias 15KB 15KB [ 2342.407213] ip_dst_cache 28KB 28KB [ 2342.407788] PING 62KB 62KB [ 2342.408385] RAW 93KB 93KB [ 2342.409017] UDP 169KB 283KB [ 2342.409591] request_sock_TCP 7KB 7KB [ 2342.410195] TCP 60KB 60KB [ 2342.410783] hugetlbfs_inode_cache 30KB 30KB [ 2342.411475] bio-1 11KB 11KB [ 2342.412112] eventpoll_pwq 23KB 23KB [ 2342.412706] eventpoll_epi 59KB 59KB [ 2342.413428] inotify_inode_mark 70KB 70KB [ 2342.414054] request_queue 60KB 60KB [ 2342.414646] blkdev_ioc 37KB 37KB [ 2342.415242] bio-0 120KB 120KB [ 2342.415837] biovec-max 803KB 803KB [ 2342.416417] biovec-64 220KB 220KB [ 2342.417032] biovec-16 26KB 26KB [ 2342.417627] uid_cache 8KB 8KB [ 2342.418229] dmaengine-unmap-2 4KB 4KB [ 2342.418839] audit_buffer 7KB 7KB [ 2342.419426] skbuff_ext_cache 124KB 184KB [ 2342.420027] skbuff_fclone_cache 67KB 75KB [ 2342.420626] skbuff_head_cache 75KB 93KB [ 2342.421248] file_lock_cache 33KB 51KB [ 2342.421853] file_lock_ctx 7KB 7KB [ 2342.422495] fsnotify_mark_connector 40KB 40KB [ 2342.423244] net_namespace 88KB 88KB [ 2342.423938] task_delay_info 321KB 385KB [ 2342.424518] taskstats 61KB 61KB [ 2342.425119] proc_dir_entry 363KB 363KB [ 2342.425706] pde_opener 39KB 39KB [ 2342.426315] seq_file 63KB 63KB [ 2342.426921] sigqueue 106KB 106KB [ 2342.427519] shmem_inode_cache 1244KB 1383KB [ 2342.428139] kernfs_iattrs_cache 235KB 235KB [ 2342.428742] kernfs_node_cache 5195KB 5195KB [ 2342.429349] mnt_cache 141KB 141KB [ 2342.429976] filp 1268KB 1980KB [ 2342.430573] names_cache 8742KB 11364KB [ 2342.431180] hashtab_node 274KB 274KB [ 2342.431755] ebitmap_node 1149KB 1149KB [ 2342.432349] avtab_node 4976KB 4976KB [ 2342.432952] avc_node 31KB 31KB [ 2342.433540] lsm_inode_cache 3266KB 3312KB [ 2342.434138] lsm_file_cache 160KB 216KB [ 2342.434722] key_jar 23KB 23KB [ 2342.435338] uts_namespace 15KB 15KB [ 2342.435955] nsproxy 15KB 15KB [ 2342.436562] vm_area_struct 2721KB 2940KB [ 2342.437162] mm_struct 449KB 504KB [ 2342.437767] fs_cache 66KB 84KB [ 2342.438375] files_cache 302KB 302KB [ 2342.438995] signal_cache 619KB 648KB [ 2342.439564] sighand_cache 700KB 721KB [ 2342.440193] task_struct 8854KB 10710KB [ 2342.440806] cred_jar 163KB 228KB [ 2342.441429] anon_vma_chain 737KB 811KB [ 2342.442037] anon_vma 948KB 948KB [ 2342.442627] pid 66KB 67KB [ 2342.443238] Acpi-Operand 128KB 162KB [ 2342.443809] Acpi-ParseExt 31KB 31KB [ 2342.444407] Acpi-Parse 134KB 150KB [ 2342.444998] Acpi-State 137KB 153KB [ 2342.445589] Acpi-Namespace 24KB 24KB [ 2342.446190] numa_policy 3KB 3KB [ 2342.446778] trace_event_file 163KB 163KB [ 2342.447383] ftrace_event_field 280KB 280KB [ 2342.448005] pool_workqueue 48KB 48KB [ 2342.448582] task_group 16KB 16KB [ 2342.449210] vmap_area 582KB 582KB [ 2342.449805] page->ptl 661KB 689KB [ 2342.450419] kmemleak_scan_area 290KB 290KB [ 2342.451563] kmemleak_object 151167KB 157820KB [ 2342.452179] kmalloc-8k 4992KB 5088KB [ 2342.452779] kmalloc-4k 5840KB 7104KB [ 2342.453392] kmalloc-2k 4972KB 5120KB [ 2342.454011] kmalloc-1k 2210KB 3360KB [ 2342.454624] kmalloc-512 1962KB 3328KB [ 2342.455230] kmalloc-256 1102KB 1152KB [ 2342.455845] kmalloc-192 521KB 528KB [ 2342.456447] kmalloc-128 628KB 632KB [ 2342.457074] kmalloc-96 302KB 496KB [ 2342.457685] kmalloc-64 1028KB 1328KB [ 2342.458300] kmalloc-32 792KB 860KB [ 2342.458916] kmalloc-16 376KB 376KB [ 2342.459515] kmalloc-8 330KB 330KB [ 2342.460119] kmem_cache_node 47KB 47KB [ 2342.460768] kmem_cache 75KB 75KB [ 2342.461368] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=257,uid=0 [ 2342.463991] Out of memory (oom_kill_allocating_task): Killed process 254 (syz-fuzzer) total-vm:1172752kB, anon-rss:191828kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:836kB oom_score_adj:0 [ 2346.613387] systemd-udevd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-1000 [ 2346.615558] CPU: 0 PID: 115 Comm: systemd-udevd Not tainted 5.10.156 #1 [ 2346.616930] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.618626] Call Trace: [ 2346.619176] dump_stack+0x107/0x167 [ 2346.619937] dump_header+0x106/0x613 [ 2346.620710] oom_kill_process.cold+0x10/0x15 [ 2346.621635] out_of_memory+0x358/0x1410 [ 2346.622478] ? oom_killer_disable+0x280/0x280 [ 2346.623398] ? mutex_trylock+0x237/0x2b0 [ 2346.624233] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2220 [ 2346.625477] __alloc_pages_slowpath.constprop.0+0x1bf3/0x2220 [ 2346.626692] ? lock_acquire+0x117/0x490 [ 2346.627518] ? warn_alloc+0x190/0x190 [ 2346.628338] __alloc_pages_nodemask+0x553/0x680 [ 2346.629315] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2346.630545] ? xas_load+0x66/0x2c0 [ 2346.631285] ? find_get_entry+0x2d9/0x6e0 [ 2346.632148] alloc_pages_current+0x187/0x280 [ 2346.633068] __page_cache_alloc+0x2d2/0x360 [ 2346.633960] pagecache_get_page+0x2c7/0xc80 [ 2346.634858] filemap_fault+0x177d/0x21b0 [ 2346.635703] ? read_cache_page_gfp+0x30/0x30 [ 2346.636610] ? handle_mm_fault+0x28d0/0x3520 [ 2346.637521] ? lock_downgrade+0x6d0/0x6d0 [ 2346.638381] ext4_filemap_fault+0x87/0xc0 [ 2346.639231] __do_fault+0x113/0x410 [ 2346.639982] handle_mm_fault+0x1e72/0x3520 [ 2346.640872] ? find_held_lock+0x2c/0x110 [ 2346.641715] ? __pmd_alloc+0x5e0/0x5e0 [ 2346.642527] ? vmacache_find+0x55/0x2a0 [ 2346.643352] do_user_addr_fault+0x56e/0xc00 [ 2346.644254] exc_page_fault+0xa2/0x1a0 [ 2346.645066] ? asm_exc_page_fault+0x8/0x30 [ 2346.645944] asm_exc_page_fault+0x1e/0x30 [ 2346.646789] RIP: 0033:0x55d1d4531487 [ 2346.647553] Code: Unable to access opcode bytes at RIP 0x55d1d453145d. [ 2346.648909] RSP: 002b:00007ffcf901b3a0 EFLAGS: 00010202 [ 2346.650002] RAX: 000055d1d453e4b5 RBX: 000055d1d5ca02e0 RCX: 00007ffcf901b390 [ 2346.651457] RDX: 000055d1d457d840 RSI: 0000000000000000 RDI: 0000000000020285 [ 2346.652920] RBP: 00007ffcf901b3a0 R08: f4be21921f2895be R09: afb4d9534ff039d2 [ 2346.654381] R10: 486fbc8705642056 R11: 0000000000000246 R12: 0000000000020285 [ 2346.655841] R13: 000055d1d5cd5540 R14: 000055d1d5ccf940 R15: 000055d1d5cfbc60 [ 2346.657475] Mem-Info: [ 2346.658027] active_anon:35 inactive_anon:8365 isolated_anon:0 [ 2346.658027] active_file:25 inactive_file:20 isolated_file:0 [ 2346.658027] unevictable:0 dirty:0 writeback:0 [ 2346.658027] slab_reclaimable:7398 slab_unreclaimable:59901 [ 2346.658027] mapped:8706 shmem:74 pagetables:374 bounce:0 [ 2346.658027] free:3108 free_pcp:62 free_cma:0 [ 2346.664289] Node 0 active_anon:140kB inactive_anon:33460kB active_file:100kB inactive_file:80kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34824kB dirty:0kB writeback:0kB shmem:296kB writeback_tmp:0kB kernel_stack:3040kB all_unreclaimable? yes [ 2346.669019] Node 0 DMA free:6520kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2346.674338] lowmem_reserve[]: 0 1618 1618 1618 [ 2346.675336] Node 0 DMA32 free:5912kB min:7168kB low:8824kB high:10480kB reserved_highatomic:0KB active_anon:140kB inactive_anon:33460kB active_file:108kB inactive_file:72kB unevictable:0kB writepending:0kB present:2080640kB managed:1662796kB mlocked:0kB pagetables:1496kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 2346.681163] lowmem_reserve[]: 0 0 0 0 [ 2346.682007] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6520kB [ 2346.684864] Node 0 DMA32: 537*4kB (UME) 273*8kB (UME) 85*16kB (UME) 7*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5916kB [ 2346.687701] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2346.689460] 105 total pagecache pages [ 2346.690266] 0 pages in swap cache [ 2346.690996] Swap cache stats: add 0, delete 0, find 0/0 [ 2346.692097] Free swap = 0kB [ 2346.692712] Total swap = 0kB [ 2346.693374] 524158 pages RAM [ 2346.694014] 0 pages HighMem/MovableOnly [ 2346.694841] 104482 pages reserved [ 2346.695539] Unreclaimable slab info: [ 2346.696321] Name Used Total [ 2346.697485] pid_2 153KB 378KB [ 2346.698592] p9_req_t 8KB 8KB [ 2346.699701] fib6_nodes 28KB 28KB [ 2346.700818] ip6_dst_cache 45KB 45KB [ 2346.701941] PINGv6 31KB 31KB [ 2346.703062] RAWv6 157KB 157KB [ 2346.704165] UDPLITEv6 62KB 62KB [ 2346.705287] UDPv6 62KB 62KB [ 2346.706392] tw_sock_TCPv6 7KB 7KB [ 2346.707496] TCPv6 62KB 62KB [ 2346.708610] scsi_sense_cache 8KB 8KB [ 2346.709725] sd_ext_cdb 3KB 3KB [ 2346.710851] virtio_scsi_cmd 16KB 16KB [ 2346.711963] sgpool-128 59KB 59KB [ 2346.713076] sgpool-64 63KB 63KB [ 2346.714180] sgpool-32 630KB 630KB [ 2346.715285] sgpool-16 172KB 172KB [ 2346.716391] sgpool-8 142KB 142KB [ 2346.717511] mqueue_inode_cache 62KB 62KB [ 2346.718638] nfs_commit_data 15KB 15KB [ 2346.719744] nfs_write_data 47KB 47KB [ 2346.720860] jbd2_inode 7KB 7KB [ 2346.721973] ext4_system_zone 7KB 7KB [ 2346.723074] ext4_io_end_vec 7KB 7KB [ 2346.724175] ext4_bio_post_read_ctx 15KB 15KB [ 2346.725382] io_kiocb 11KB 11KB [ 2346.726485] kioctx 31KB 31KB [ 2346.727587] aio_kiocb 7KB 7KB [ 2346.728692] dio 15KB 15KB [ 2346.729803] bio-2 4KB 4KB [ 2346.730934] pid_namespace 7KB 7KB [ 2346.732046] posix_timers_cache 7KB 7KB [ 2346.733202] rpc_buffers 31KB 31KB [ 2346.734313] rpc_tasks 3KB 3KB [ 2346.735436] UNIX 261KB 310KB [ 2346.736551] tcp_bind_bucket 8KB 8KB [ 2346.737675] xfrm_state 32KB 32KB [ 2346.738798] ip_fib_trie 8KB 8KB [ 2346.739904] ip_fib_alias 15KB 15KB [ 2346.741027] ip_dst_cache 28KB 28KB [ 2346.742136] PING 62KB 62KB [ 2346.743256] RAW 93KB 93KB [ 2346.744368] UDP 168KB 283KB [ 2346.745492] tw_sock_TCP 7KB 7KB [ 2346.746611] request_sock_TCP 7KB 7KB [ 2346.747724] TCP 60KB 60KB [ 2346.748847] hugetlbfs_inode_cache 30KB 30KB [ 2346.750020] bio-1 11KB 11KB [ 2346.751122] eventpoll_pwq 23KB 23KB [ 2346.752233] eventpoll_epi 59KB 59KB [ 2346.753359] inotify_inode_mark 70KB 70KB [ 2346.754479] request_queue 60KB 60KB [ 2346.755583] blkdev_ioc 37KB 37KB [ 2346.756690] bio-0 516KB 516KB [ 2346.757802] biovec-max 862KB 1024KB [ 2346.758919] biovec-64 677KB 677KB [ 2346.760026] biovec-16 131KB 131KB [ 2346.761129] uid_cache 8KB 8KB [ 2346.762221] dmaengine-unmap-2 4KB 4KB [ 2346.763313] audit_buffer 7KB 7KB [ 2346.764410] skbuff_ext_cache 140KB 184KB [ 2346.765519] skbuff_fclone_cache 67KB 75KB [ 2346.766644] skbuff_head_cache 232KB 232KB [ 2346.767738] file_lock_cache 31KB 47KB [ 2346.768854] file_lock_ctx 7KB 7KB [ 2346.769945] fsnotify_mark_connector 40KB 40KB [ 2346.771143] net_namespace 88KB 88KB [ 2346.772241] task_delay_info 177KB 316KB [ 2346.773350] taskstats 61KB 61KB [ 2346.774439] proc_dir_entry 319KB 337KB [ 2346.775526] pde_opener 39KB 39KB [ 2346.776616] seq_file 67KB 67KB [ 2346.777715] sigqueue 106KB 106KB [ 2346.778807] shmem_inode_cache 1227KB 1383KB [ 2346.779898] kernfs_iattrs_cache 235KB 235KB [ 2346.781043] kernfs_node_cache 5033KB 5091KB [ 2346.782147] mnt_cache 141KB 141KB [ 2346.783260] filp 806KB 1567KB [ 2346.784353] names_cache 2864KB 3302KB [ 2346.785451] hashtab_node 274KB 274KB [ 2346.786540] ebitmap_node 1149KB 1149KB [ 2346.787628] avtab_node 4976KB 4976KB [ 2346.788745] avc_node 31KB 31KB [ 2346.789882] lsm_inode_cache 2619KB 3087KB [ 2346.790974] lsm_file_cache 160KB 216KB [ 2346.792061] key_jar 23KB 23KB [ 2346.793177] uts_namespace 15KB 15KB [ 2346.794269] nsproxy 15KB 15KB [ 2346.795401] vm_area_struct 2322KB 2764KB [ 2346.796495] mm_struct 420KB 504KB [ 2346.797596] fs_cache 61KB 84KB [ 2346.798687] files_cache 302KB 302KB [ 2346.799776] signal_cache 601KB 648KB [ 2346.800891] sighand_cache 314KB 541KB [ 2346.802002] task_struct 2199KB 4781KB [ 2346.803095] cred_jar 149KB 228KB [ 2346.804197] anon_vma_chain 628KB 783KB [ 2346.805303] anon_vma 212KB 318KB [ 2346.806389] pid 66KB 67KB [ 2346.807482] Acpi-Operand 128KB 162KB [ 2346.808573] Acpi-ParseExt 31KB 31KB [ 2346.809676] Acpi-Parse 134KB 150KB [ 2346.810765] Acpi-State 137KB 153KB [ 2346.811852] Acpi-Namespace 24KB 24KB [ 2346.812956] numa_policy 3KB 3KB [ 2346.814041] trace_event_file 163KB 163KB [ 2346.815138] ftrace_event_field 280KB 280KB [ 2346.816244] pool_workqueue 48KB 48KB [ 2346.817342] task_group 16KB 16KB [ 2346.818437] vmap_area 224KB 236KB [ 2346.819539] page->ptl 539KB 657KB [ 2346.820628] kmemleak_scan_area 171KB 183KB [ 2346.822870] kmemleak_object 134009KB 156013KB [ 2346.824004] kmalloc-8k 4384KB 4672KB [ 2346.825118] kmalloc-4k 6112KB 6752KB [ 2346.826215] kmalloc-2k 4580KB 5088KB [ 2346.827312] kmalloc-1k 2220KB 3360KB [ 2346.828422] kmalloc-512 2184KB 3312KB [ 2346.829520] kmalloc-256 1103KB 1152KB [ 2346.830611] kmalloc-192 579KB 604KB [ 2346.831702] kmalloc-128 607KB 632KB [ 2346.832845] kmalloc-96 292KB 496KB [ 2346.833952] kmalloc-64 990KB 1320KB [ 2346.835049] kmalloc-32 736KB 860KB [ 2346.836138] kmalloc-16 376KB 376KB [ 2346.837237] kmalloc-8 330KB 330KB [ 2346.838326] kmem_cache_node 47KB 47KB [ 2346.839414] kmem_cache 75KB 75KB [ 2346.840505] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/syz7,task=syz-executor.7,pid=130660,uid=0 [ 2346.843354] Out of memory: Killed process 130914 (syz-executor.7) total-vm:94952kB, anon-rss:460kB, file-rss:34820kB, shmem-rss:0kB, UID:0 pgtables:152kB oom_score_adj:1000 [ 2346.858323] sshd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2346.860280] CPU: 0 PID: 248 Comm: sshd Not tainted 5.10.156 #1 [ 2346.861490] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.863165] Call Trace: [ 2346.863700] dump_stack+0x107/0x167 [ 2346.864444] dump_header+0x106/0x613 [ 2346.865206] oom_kill_process.cold+0x10/0x15 [ 2346.866091] out_of_memory+0x110f/0x1410 [ 2346.866917] ? oom_killer_disable+0x280/0x280 [ 2346.867816] ? mutex_trylock+0x237/0x2b0 [ 2346.868632] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2220 [ 2346.869834] __alloc_pages_slowpath.constprop.0+0x1bf3/0x2220 [ 2346.871023] ? lock_acquire+0x117/0x490 [ 2346.871834] ? warn_alloc+0x190/0x190 [ 2346.872629] __alloc_pages_nodemask+0x553/0x680 [ 2346.873584] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2346.874783] ? xas_load+0x66/0x2c0 [ 2346.875502] ? find_get_entry+0x2d9/0x6e0 [ 2346.876344] alloc_pages_current+0x187/0x280 [ 2346.877235] __page_cache_alloc+0x2d2/0x360 [ 2346.878104] pagecache_get_page+0x2c7/0xc80 [ 2346.878975] filemap_fault+0x177d/0x21b0 [ 2346.879801] ? read_cache_page_gfp+0x30/0x30 [ 2346.880685] ? replace_page_cache_page+0x1200/0x1200 [ 2346.881723] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 2346.882782] ext4_filemap_fault+0x87/0xc0 [ 2346.883615] __do_fault+0x113/0x410 [ 2346.884352] handle_mm_fault+0x1e72/0x3520 [ 2346.885214] ? find_held_lock+0x2c/0x110 [ 2346.886031] ? __pmd_alloc+0x5e0/0x5e0 [ 2346.886822] ? vmacache_find+0x55/0x2a0 [ 2346.887632] do_user_addr_fault+0x56e/0xc00 [ 2346.888508] exc_page_fault+0xa2/0x1a0 [ 2346.889302] ? asm_exc_page_fault+0x8/0x30 [ 2346.890153] asm_exc_page_fault+0x1e/0x30 [ 2346.890986] RIP: 0033:0x7f0b1b98a070 [ 2346.891734] Code: Unable to access opcode bytes at RIP 0x7f0b1b98a046. [ 2346.893070] RSP: 002b:00007ffeb3f0f498 EFLAGS: 00010206 [ 2346.894139] RAX: 00007f0b1bac5f10 RBX: 00007f0b1bac5af0 RCX: 0000000000000000 [ 2346.895562] RDX: 00007f0b1bac5f30 RSI: 00007f0b1c09c740 RDI: 00007f0b1b4d1000 [ 2346.897004] RBP: 00007f0b1b4d1000 R08: 000055a2f82150d0 R09: 0000000000000000 [ 2346.898431] R10: 0000000000000003 R11: 0000000200000000 R12: 00007f0b1bac5b10 [ 2346.899857] R13: 00007f0b1bac5ae8 R14: 0000000000000020 R15: 0000000000000000 [ 2346.901412] Mem-Info: [ 2346.901958] active_anon:35 inactive_anon:8365 isolated_anon:0 [ 2346.901958] active_file:25 inactive_file:20 isolated_file:0 [ 2346.901958] unevictable:0 dirty:0 writeback:0 [ 2346.901958] slab_reclaimable:7398 slab_unreclaimable:59901 [ 2346.901958] mapped:8706 shmem:74 pagetables:374 bounce:0 [ 2346.901958] free:2732 free_pcp:66 free_cma:0 [ 2346.908201] Node 0 active_anon:140kB inactive_anon:33460kB active_file:100kB inactive_file:80kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34824kB dirty:0kB writeback:0kB shmem:296kB writeback_tmp:0kB kernel_stack:3040kB all_unreclaimable? no [ 2346.912882] Node 0 DMA free:6480kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2346.915060] syz-executor.7: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null) [ 2346.918276] lowmem_reserve[]: 0 1618 1618 1618 [ 2346.918374] Node 0 DMA32 free:4448kB min:9216kB low:10872kB high:12528kB reserved_highatomic:0KB active_anon:140kB inactive_anon:33460kB active_file:108kB inactive_file:72kB unevictable:0kB writepending:0kB present:2080640kB managed:1662796kB mlocked:0kB pagetables:1496kB bounce:0kB free_pcp:264kB local_pcp:4kB free_cma:0kB [ 2346.920897] ,cpuset= [ 2346.921794] lowmem_reserve[]: 0 0 0 [ 2346.928300] syz7 [ 2346.928611] 0 [ 2346.928624] Node 0 DMA: 0*4kB 0*8kB [ 2346.929684] ,mems_allowed=0 [ 2346.930096] 1*16kB (U) [ 2346.930505] [ 2346.931297] 0*32kB 1*64kB [ 2346.931991] CPU: 1 PID: 130914 Comm: syz-executor.7 Not tainted 5.10.156 #1 [ 2346.932007] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.932531] (U) [ 2346.932894] Call Trace: [ 2346.932923] dump_stack+0x107/0x167 [ 2346.932953] warn_alloc.cold+0x95/0x18a [ 2346.933516] 0*128kB [ 2346.935045] ? zone_watermark_ok_safe+0x260/0x260 [ 2346.935069] ? schedule_timeout+0x1ce/0x3f0 [ 2346.936802] 1*256kB [ 2346.937221] ? usleep_range+0x170/0x170 [ 2346.937247] ? __next_timer_interrupt+0x2c0/0x2c0 [ 2346.937759] (U) [ 2346.938570] __alloc_pages_slowpath.constprop.0+0x1cc3/0x2220 [ 2346.939373] 0*512kB [ 2346.939895] ? lock_acquire+0x117/0x490 [ 2346.940885] 0*1024kB [ 2346.941812] ? warn_alloc+0x190/0x190 [ 2346.942286] 1*2048kB [ 2346.943228] __alloc_pages_nodemask+0x553/0x680 [ 2346.944192] (M) [ 2346.944620] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2346.945823] 1*4096kB [ 2346.946317] ? asm_common_interrupt+0x1e/0x40 [ 2346.947121] (M) [ 2346.947644] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2346.948402] = 6480kB [ 2346.948919] ? asm_common_interrupt+0x1e/0x40 [ 2346.948953] ? alloc_pages_current+0x87/0x280 [ 2346.949883] Node 0 [ 2346.950309] alloc_pages_current+0x187/0x280 [ 2346.951365] DMA32: [ 2346.951876] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 2346.951901] relay_open_buf.part.0+0x2a5/0xc00 [ 2346.952805] 376*4kB [ 2346.953257] relay_open+0x531/0xa10 [ 2346.953289] do_blk_trace_setup+0x4db/0xbf0 [ 2346.954489] (UME) [ 2346.954987] ? _copy_from_user+0xfb/0x1b0 [ 2346.955011] __blk_trace_setup+0xca/0x180 [ 2346.955918] 189*8kB [ 2346.956877] ? do_blk_trace_setup+0xbf0/0xbf0 [ 2346.956902] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2346.957347] (UME) [ 2346.958317] blk_trace_ioctl+0x155/0x290 [ 2346.958764] 78*16kB [ 2346.959782] ? blk_add_trace_bio_remap+0x560/0x560 [ 2346.959806] ? do_vfs_ioctl+0x283/0x10d0 [ 2346.960750] (UME) [ 2346.961246] ? selinux_inode_getsecctx+0x90/0x90 [ 2346.961268] ? generic_block_fiemap+0x60/0x60 [ 2346.962009] 7*32kB [ 2346.962936] blkdev_ioctl+0xc1/0x710 [ 2346.962961] ? blkdev_common_ioctl+0x1870/0x1870 [ 2346.963389] (UM) [ 2346.964286] ? selinux_file_ioctl+0xb1/0x260 [ 2346.964312] block_ioctl+0xf9/0x140 [ 2346.965164] 0*64kB [ 2346.965662] ? blkdev_read_iter+0x1c0/0x1c0 [ 2346.966573] 0*128kB [ 2346.967689] __x64_sys_ioctl+0x19a/0x210 [ 2346.967716] do_syscall_64+0x33/0x40 [ 2346.968154] 0*256kB [ 2346.969021] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2346.969040] RIP: 0033:0x7efc39ad0b19 [ 2346.969510] 0*512kB [ 2346.970570] Code: Unable to access opcode bytes at RIP 0x7efc39ad0aef. [ 2346.970587] RSP: 002b:00007efc37025188 EFLAGS: 00000246 [ 2346.971415] 0*1024kB [ 2346.971861] ORIG_RAX: 0000000000000010 [ 2346.971875] RAX: ffffffffffffffda RBX: 00007efc39be4020 RCX: 00007efc39ad0b19 [ 2346.971893] RDX: 0000000020000280 RSI: 00000000c0481273 RDI: 0000000000000004 [ 2346.972869] 0*2048kB [ 2346.973810] RBP: 00007efc39b2af6d R08: 0000000000000000 R09: 0000000000000000 [ 2346.973830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2346.974300] 0*4096kB [ 2346.975074] R13: 00007ffea46cc36f R14: 00007efc37025300 R15: 0000000000022000 [ 2346.975197] Mem-Info: [ 2346.976065] = 4488kB [ 2346.976084] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2346.976561] active_anon:35 inactive_anon:8365 isolated_anon:0 [ 2346.976561] active_file:25 inactive_file:20 isolated_file:0 [ 2346.976561] unevictable:0 dirty:0 writeback:0 [ 2346.976561] slab_reclaimable:7398 slab_unreclaimable:59901 [ 2346.976561] mapped:8706 shmem:74 pagetables:374 bounce:0 [ 2346.976561] free:2732 free_pcp:66 free_cma:0 [ 2346.977441] 105 total pagecache pages [ 2346.977454] 0 pages in swap cache [ 2346.978282] Node 0 active_anon:140kB inactive_anon:33460kB active_file:100kB inactive_file:80kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34824kB dirty:0kB writeback:0kB shmem:296kB writeback_tmp:0kB kernel_stack:3040kB all_unreclaimable? no [ 2346.978710] Swap cache stats: add 0, delete 0, find 0/0 [ 2346.978721] Free swap = 0kB [ 2346.979674] Node 0 [ 2346.980161] Total swap = 0kB [ 2346.980173] 524158 pages RAM [ 2346.981110] DMA free:6480kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2346.981849] 0 pages HighMem/MovableOnly [ 2346.981864] 104482 pages reserved [ 2346.982367] lowmem_reserve[]: [ 2346.983428] Unreclaimable slab info: [ 2346.984263] 0 [ 2346.984736] Name Used Total [ 2346.984756] pid_2 153KB 378KB [ 2346.986194] 1618 [ 2346.987298] p9_req_t 8KB 8KB [ 2346.987313] fib6_nodes 28KB 28KB [ 2346.987857] 1618 [ 2346.988656] ip6_dst_cache 45KB 45KB [ 2346.990235] 1618 [ 2346.991698] PINGv6 31KB 31KB [ 2346.991713] RAWv6 157KB 157KB [ 2346.992255] [ 2346.993736] UDPLITEv6 62KB 62KB [ 2346.993752] UDPv6 62KB 62KB [ 2346.995314] Node 0 DMA32 free:4448kB min:9216kB low:10872kB high:12528kB reserved_highatomic:0KB active_anon:140kB inactive_anon:33460kB active_file:108kB inactive_file:72kB unevictable:0kB writepending:0kB present:2080640kB managed:1662796kB mlocked:0kB pagetables:1496kB bounce:0kB free_pcp:264kB local_pcp:260kB free_cma:0kB [ 2346.995822] tw_sock_TCPv6 7KB 7KB [ 2346.997395] lowmem_reserve[]: [ 2346.997900] TCPv6 62KB 62KB [ 2346.997917] scsi_sense_cache 8KB 8KB [ 2346.998417] 0 [ 2347.000142] sd_ext_cdb 3KB 3KB [ 2347.000160] virtio_scsi_cmd 16KB 16KB [ 2347.006812] 0 [ 2347.007623] sgpool-128 59KB 59KB [ 2347.008363] 0 [ 2347.013053] sgpool-64 63KB 63KB [ 2347.013073] sgpool-32 630KB 630KB [ 2347.014245] 0 [ 2347.014876] sgpool-16 172KB 172KB [ 2347.014891] sgpool-8 142KB 142KB [ 2347.015375] [ 2347.016010] mqueue_inode_cache 62KB 62KB [ 2347.016025] nfs_commit_data 15KB 15KB [ 2347.016676] Node 0 [ 2347.021767] nfs_write_data 47KB 47KB [ 2347.021782] jbd2_inode 7KB 7KB [ 2347.022656] DMA: [ 2347.023367] ext4_system_zone 7KB 7KB [ 2347.023382] ext4_io_end_vec 7KB 7KB [ 2347.024077] 0*4kB [ 2347.024853] ext4_bio_post_read_ctx 15KB 15KB [ 2347.024869] io_kiocb 11KB 11KB [ 2347.025263] 0*8kB [ 2347.026391] kioctx 31KB 31KB [ 2347.026406] aio_kiocb 7KB 7KB [ 2347.027571] 1*16kB [ 2347.028008] dio 15KB 15KB [ 2347.028023] bio-2 4KB 4KB [ 2347.029198] (U) [ 2347.030284] pid_namespace 7KB 7KB [ 2347.030299] posix_timers_cache 7KB 7KB [ 2347.030751] 0*32kB [ 2347.031848] rpc_buffers 31KB 31KB [ 2347.031863] rpc_tasks 3KB 3KB [ 2347.032314] 1*64kB [ 2347.033410] UNIX 261KB 310KB [ 2347.033425] tcp_bind_bucket 8KB 8KB [ 2347.034592] (U) [ 2347.034948] xfrm_state 32KB 32KB [ 2347.034963] ip_fib_trie 8KB 8KB [ 2347.036132] 0*128kB [ 2347.037232] ip_fib_alias 15KB 15KB [ 2347.037249] ip_dst_cache 28KB 28KB [ 2347.043384] 1*256kB [ 2347.044470] PING 62KB 62KB [ 2347.044484] RAW 93KB 93KB [ 2347.045189] (U) [ 2347.046298] UDP 168KB 283KB [ 2347.046313] tw_sock_TCP 7KB 7KB [ 2347.047477] 0*512kB [ 2347.047864] request_sock_TCP 7KB 7KB [ 2347.047878] TCP 60KB 60KB [ 2347.049052] 0*1024kB [ 2347.050146] hugetlbfs_inode_cache 30KB 30KB [ 2347.050161] bio-1 11KB 11KB [ 2347.050554] 1*2048kB [ 2347.051654] eventpoll_pwq 23KB 23KB [ 2347.051668] eventpoll_epi 59KB 59KB [ 2347.052084] (M) [ 2347.053185] inotify_inode_mark 70KB 70KB [ 2347.053200] request_queue 60KB 60KB [ 2347.054367] 1*4096kB [ 2347.054742] blkdev_ioc 37KB 37KB [ 2347.055906] (M) [ 2347.057033] bio-0 516KB 516KB [ 2347.057048] biovec-max 862KB 1024KB [ 2347.057410] = 6480kB [ 2347.058544] biovec-64 677KB 677KB [ 2347.059709] Node 0 [ 2347.060183] biovec-16 131KB 131KB [ 2347.060198] uid_cache 8KB 8KB [ 2347.061380] DMA32: [ 2347.062483] dmaengine-unmap-2 4KB 4KB [ 2347.062498] audit_buffer 7KB 7KB [ 2347.062971] 376*4kB [ 2347.064088] skbuff_ext_cache 140KB 184KB [ 2347.064103] skbuff_fclone_cache 67KB 75KB [ 2347.065275] (UME) [ 2347.065724] skbuff_head_cache 232KB 232KB [ 2347.066972] 189*8kB [ 2347.068084] file_lock_cache 31KB 47KB [ 2347.068099] file_lock_ctx 7KB 7KB [ 2347.068558] (UME) [ 2347.069689] fsnotify_mark_connector 40KB 40KB [ 2347.069701] net_namespace 88KB 88KB [ 2347.069713] task_delay_info 177KB 316KB [ 2347.069725] taskstats 61KB 61KB [ 2347.069736] proc_dir_entry 319KB 337KB [ 2347.069751] pde_opener 39KB 39KB [ 2347.070934] 78*16kB [ 2347.071385] seq_file 67KB 67KB [ 2347.072565] (UME) [ 2347.073661] sigqueue 106KB 106KB [ 2347.073677] shmem_inode_cache 1227KB 1383KB [ 2347.074134] 7*32kB [ 2347.075230] kernfs_iattrs_cache 235KB 235KB [ 2347.075245] kernfs_node_cache 5033KB 5091KB [ 2347.076438] (UM) [ 2347.076944] mnt_cache 141KB 141KB [ 2347.076960] filp 806KB 1567KB [ 2347.078127] 0*64kB [ 2347.079243] names_cache 2864KB 3302KB [ 2347.079258] hashtab_node 274KB 274KB [ 2347.079745] 0*128kB [ 2347.080864] ebitmap_node 1149KB 1149KB [ 2347.080879] avtab_node 4976KB 4976KB [ 2347.082048] 0*256kB [ 2347.082459] avc_node 31KB 31KB [ 2347.083624] 0*512kB [ 2347.084757] lsm_inode_cache 2619KB 3087KB [ 2347.085285] 0*1024kB [ 2347.086391] lsm_file_cache 160KB 216KB [ 2347.086406] key_jar 23KB 23KB [ 2347.087574] 0*2048kB [ 2347.088066] uts_namespace 15KB 15KB [ 2347.088081] nsproxy 15KB 15KB [ 2347.089259] 0*4096kB [ 2347.090365] vm_area_struct 2322KB 2764KB [ 2347.090793] = 4488kB [ 2347.091901] mm_struct 420KB 504KB [ 2347.091916] fs_cache 61KB 84KB [ 2347.093098] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2347.093660] files_cache 302KB 302KB [ 2347.094789] 105 total pagecache pages [ 2347.095846] signal_cache 601KB 648KB [ 2347.095860] sighand_cache 314KB 541KB [ 2347.096364] 0 pages in swap cache [ 2347.097505] task_struct 2199KB 4781KB [ 2347.098640] Swap cache stats: add 0, delete 0, find 0/0 [ 2347.099134] cred_jar 149KB 228KB [ 2347.099149] anon_vma_chain 628KB 783KB [ 2347.100287] Free swap = 0kB [ 2347.101342] anon_vma 212KB 318KB [ 2347.101356] pid 66KB 67KB [ 2347.101774] Total swap = 0kB [ 2347.102874] Acpi-Operand 128KB 162KB [ 2347.104004] 524158 pages RAM [ 2347.104481] Acpi-ParseExt 31KB 31KB [ 2347.105634] 0 pages HighMem/MovableOnly [ 2347.106045] Acpi-Parse 134KB 150KB [ 2347.106059] Acpi-State 137KB 153KB [ 2347.107187] 104482 pages reserved [ 2347.108238] Acpi-Namespace 24KB 24KB [ 2347.108252] numa_policy 3KB 3KB [ 2347.178011] trace_event_file 163KB 163KB [ 2347.179086] ftrace_event_field 280KB 280KB [ 2347.180178] pool_workqueue 48KB 48KB [ 2347.181260] task_group 16KB 16KB [ 2347.182336] vmap_area 224KB 236KB [ 2347.183422] page->ptl 539KB 657KB [ 2347.184499] kmemleak_scan_area 171KB 183KB [ 2347.185791] kmemleak_object 134009KB 156013KB [ 2347.186884] kmalloc-8k 4384KB 4672KB [ 2347.187979] kmalloc-4k 6112KB 6752KB [ 2347.189071] kmalloc-2k 4580KB 5088KB [ 2347.190155] kmalloc-1k 2220KB 3360KB [ 2347.191246] kmalloc-512 2184KB 3312KB [ 2347.192324] kmalloc-256 1103KB 1152KB [ 2347.193420] kmalloc-192 579KB 604KB [ 2347.194527] kmalloc-128 607KB 632KB [ 2347.195622] kmalloc-96 292KB 496KB [ 2347.196755] kmalloc-64 990KB 1320KB [ 2347.197868] kmalloc-32 736KB 860KB [ 2347.198972] kmalloc-16 376KB 376KB [ 2347.200076] kmalloc-8 330KB 330KB [ 2347.201184] kmem_cache_node 47KB 47KB [ 2347.202290] kmem_cache 75KB 75KB [ 2347.203389] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=sshd,pid=248,uid=0 [ 2347.206405] Out of memory (oom_kill_allocating_task): Killed process 248 (sshd) total-vm:13660kB, anon-rss:1264kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2348.142163] systemd-journal invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-250 [ 2348.143390] CPU: 1 PID: 103 Comm: systemd-journal Not tainted 5.10.156 #1 [ 2348.144133] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2348.145041] Call Trace: [ 2348.145335] dump_stack+0x107/0x167 [ 2348.145736] dump_header+0x106/0x613 [ 2348.146155] oom_kill_process.cold+0x10/0x15 [ 2348.146639] out_of_memory+0x110f/0x1410 [ 2348.147102] ? oom_killer_disable+0x280/0x280 [ 2348.147595] ? mutex_trylock+0x237/0x2b0 [ 2348.148049] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2220 [ 2348.148704] __alloc_pages_slowpath.constprop.0+0x1bf3/0x2220 [ 2348.149359] ? lock_acquire+0x117/0x490 [ 2348.149802] ? warn_alloc+0x190/0x190 [ 2348.150240] __alloc_pages_nodemask+0x553/0x680 [ 2348.150753] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2348.151409] ? xas_load+0x66/0x2c0 [ 2348.151792] ? find_get_entry+0x2d9/0x6e0 [ 2348.152256] alloc_pages_current+0x187/0x280 [ 2348.152755] __page_cache_alloc+0x2d2/0x360 [ 2348.153234] pagecache_get_page+0x2c7/0xc80 [ 2348.153713] filemap_fault+0x177d/0x21b0 [ 2348.154166] ? read_cache_page_gfp+0x30/0x30 [ 2348.154660] ? replace_page_cache_page+0x1200/0x1200 [ 2348.155228] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 2348.155819] ext4_filemap_fault+0x87/0xc0 [ 2348.156276] __do_fault+0x113/0x410 [ 2348.156677] handle_mm_fault+0x1e72/0x3520 [ 2348.157155] ? __pmd_alloc+0x5e0/0x5e0 [ 2348.157588] ? vmacache_find+0x55/0x2a0 [ 2348.158052] do_user_addr_fault+0x56e/0xc00 [ 2348.158529] exc_page_fault+0xa2/0x1a0 [ 2348.158976] ? asm_exc_page_fault+0x8/0x30 [ 2348.159442] asm_exc_page_fault+0x1e/0x30 [ 2348.159900] RIP: 0033:0x7f10d040c593 [ 2348.160311] Code: Unable to access opcode bytes at RIP 0x7f10d040c569. [ 2348.161040] RSP: 002b:00007ffd05770d40 EFLAGS: 00010206 [ 2348.161628] RAX: 0000000000000000 RBX: 0000557747ea8014 RCX: 0000557747e94010 [ 2348.162421] RDX: 000000000000001c RSI: 0000000000000001 RDI: 0000557747e942f0 [ 2348.163211] RBP: 00007ffd05770d60 R08: 0000000000000000 R09: 0000000000000001 [ 2348.163995] R10: 0000000000000000 R11: 0000000000000000 R12: 00007ffd05770d90 [ 2348.164797] R13: 00007ffd05770dd0 R14: 000000000000001e R15: 0000000000000000 [ 2348.165777] Mem-Info: [ 2348.166108] active_anon:33 inactive_anon:8176 isolated_anon:0 [ 2348.166108] active_file:756 inactive_file:1003 isolated_file:51 [ 2348.166108] unevictable:0 dirty:121 writeback:6 [ 2348.166108] slab_reclaimable:7326 slab_unreclaimable:59993 [ 2348.166108] mapped:10365 shmem:69 pagetables:349 bounce:0 [ 2348.166108] free:3741 free_pcp:552 free_cma:0 [ 2348.169533] Node 0 active_anon:132kB inactive_anon:32704kB active_file:3024kB inactive_file:3900kB unevictable:0kB isolated(anon):0kB isolated(file):204kB mapped:41312kB dirty:484kB writeback:24kB shmem:276kB writeback_tmp:0kB kernel_stack:2912kB all_unreclaimable? no [ 2348.172031] Node 0 DMA free:6492kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:24kB inactive_file:0kB unevictable:0kB writepending:4kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2348.174834] lowmem_reserve[]: 0 1618 1618 1618 [ 2348.175352] Node 0 DMA32 free:10356kB min:17768kB low:19424kB high:21080kB reserved_highatomic:0KB active_anon:132kB inactive_anon:32704kB active_file:3304kB inactive_file:4484kB unevictable:0kB writepending:504kB present:2080640kB managed:1662796kB mlocked:0kB pagetables:1396kB bounce:0kB free_pcp:1000kB local_pcp:832kB free_cma:0kB [ 2348.178467] lowmem_reserve[]: 0 0 0 0 [ 2348.178913] Node 0 DMA: 3*4kB (UM) 2*8kB (M) 2*16kB (UM) 1*32kB (U) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6492kB [ 2348.180560] Node 0 DMA32: 463*4kB (UME) 266*8kB (UME) 134*16kB (UME) 72*32kB (UME) 15*64kB (UME) 2*128kB (M) 3*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 10412kB [ 2348.182255] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2348.183173] 1760 total pagecache pages [ 2348.183587] 0 pages in swap cache [ 2348.183976] Swap cache stats: add 0, delete 0, find 0/0 [ 2348.184542] Free swap = 0kB [ 2348.184896] Total swap = 0kB [ 2348.185218] 524158 pages RAM [ 2348.185539] 0 pages HighMem/MovableOnly [ 2348.185981] 104482 pages reserved [ 2348.186350] Unreclaimable slab info: [ 2348.186747] Name Used Total [ 2348.187370] pid_2 103KB 303KB [ 2348.187960] p9_req_t 8KB 8KB [ 2348.188534] fib6_nodes 28KB 28KB [ 2348.189139] ip6_dst_cache 45KB 45KB [ 2348.189711] PINGv6 31KB 31KB [ 2348.190298] RAWv6 157KB 157KB [ 2348.190896] UDPLITEv6 62KB 62KB [ 2348.191472] UDPv6 62KB 62KB [ 2348.192060] tw_sock_TCPv6 7KB 7KB [ 2348.192638] TCPv6 62KB 62KB [ 2348.193242] scsi_sense_cache 8KB 8KB [ 2348.193814] sd_ext_cdb 3KB 3KB [ 2348.194406] virtio_scsi_cmd 16KB 16KB [ 2348.194999] sgpool-128 59KB 59KB [ 2348.195572] sgpool-64 63KB 63KB [ 2348.196165] sgpool-32 630KB 630KB [ 2348.196751] sgpool-16 180KB 180KB [ 2348.197343] sgpool-8 142KB 142KB [ 2348.197929] mqueue_inode_cache 62KB 62KB [ 2348.198508] nfs_commit_data 15KB 15KB [ 2348.199092] nfs_write_data 47KB 47KB [ 2348.199663] jbd2_inode 7KB 7KB [ 2348.200259] ext4_system_zone 7KB 7KB [ 2348.200849] ext4_io_end_vec 7KB 7KB [ 2348.201439] ext4_bio_post_read_ctx 15KB 15KB [ 2348.202097] io_kiocb 11KB 11KB [ 2348.202690] kioctx 31KB 31KB [ 2348.203294] aio_kiocb 7KB 7KB [ 2348.203913] dio 15KB 15KB [ 2348.204508] bio-2 4KB 4KB [ 2348.205136] pid_namespace 7KB 7KB [ 2348.205732] posix_timers_cache 7KB 7KB [ 2348.206366] rpc_buffers 31KB 31KB [ 2348.206977] rpc_tasks 3KB 3KB [ 2348.207575] UNIX 261KB 310KB [ 2348.208188] tcp_bind_bucket 8KB 8KB [ 2348.208797] xfrm_state 32KB 32KB [ 2348.209406] ip_fib_trie 8KB 8KB [ 2348.210019] ip_fib_alias 15KB 15KB [ 2348.210605] ip_dst_cache 28KB 28KB [ 2348.211222] PING 62KB 62KB [ 2348.211837] RAW 93KB 93KB [ 2348.212427] UDP 168KB 283KB [ 2348.213046] tw_sock_TCP 7KB 7KB [ 2348.213653] request_sock_TCP 7KB 7KB [ 2348.214259] TCP 60KB 60KB [ 2348.214876] hugetlbfs_inode_cache 30KB 30KB [ 2348.215519] bio-1 11KB 11KB [ 2348.216130] eventpoll_pwq 23KB 23KB [ 2348.216722] eventpoll_epi 59KB 59KB [ 2348.217360] inotify_inode_mark 70KB 70KB [ 2348.217982] request_queue 60KB 60KB [ 2348.218583] blkdev_ioc 37KB 37KB [ 2348.219221] bio-0 624KB 624KB [ 2348.219813] biovec-max 986KB 986KB [ 2348.220432] biovec-64 834KB 834KB [ 2348.221063] biovec-16 142KB 142KB [ 2348.221663] uid_cache 8KB 8KB [ 2348.222283] dmaengine-unmap-2 4KB 4KB [ 2348.222902] audit_buffer 7KB 7KB [ 2348.223508] skbuff_ext_cache 140KB 184KB [ 2348.224128] skbuff_fclone_cache 67KB 75KB [ 2348.224754] skbuff_head_cache 266KB 266KB [ 2348.225377] file_lock_cache 31KB 47KB [ 2348.225994] file_lock_ctx 7KB 7KB [ 2348.226596] fsnotify_mark_connector 40KB 40KB [ 2348.227270] net_namespace 88KB 88KB [ 2348.227892] task_delay_info 162KB 285KB [ 2348.228483] taskstats 61KB 61KB [ 2348.229105] proc_dir_entry 319KB 337KB [ 2348.229704] pde_opener 39KB 39KB [ 2348.230323] seq_file 67KB 67KB [ 2348.230931] sigqueue 106KB 106KB [ 2348.231525] shmem_inode_cache 1227KB 1383KB [ 2348.232141] kernfs_iattrs_cache 239KB 239KB [ 2348.232763] kernfs_node_cache 5033KB 5091KB [ 2348.233386] mnt_cache 141KB 141KB [ 2348.234009] filp 1238KB 1522KB [ 2348.234612] names_cache 7123KB 7348KB [ 2348.235218] hashtab_node 274KB 274KB [ 2348.235816] ebitmap_node 1149KB 1149KB [ 2348.236432] avtab_node 4976KB 4976KB [ 2348.237055] avc_node 31KB 31KB [ 2348.237684] lsm_inode_cache 2599KB 3087KB [ 2348.238307] lsm_file_cache 159KB 212KB [ 2348.238915] key_jar 23KB 23KB [ 2348.239514] uts_namespace 15KB 15KB [ 2348.240116] nsproxy 15KB 15KB [ 2348.240800] vm_area_struct 1497KB 2292KB [ 2348.241409] mm_struct 353KB 504KB [ 2348.242026] fs_cache 42KB 84KB [ 2348.242616] files_cache 302KB 302KB [ 2348.243227] signal_cache 414KB 648KB [ 2348.243837] sighand_cache 314KB 541KB [ 2348.244442] task_struct 1383KB 3315KB [ 2348.245083] cred_jar 122KB 228KB [ 2348.245704] anon_vma_chain 345KB 653KB [ 2348.246330] anon_vma 184KB 306KB [ 2348.246944] pid 66KB 67KB [ 2348.247546] Acpi-Operand 128KB 162KB [ 2348.248158] Acpi-ParseExt 31KB 31KB [ 2348.248760] Acpi-Parse 134KB 150KB [ 2348.249383] Acpi-State 137KB 153KB [ 2348.249995] Acpi-Namespace 24KB 24KB [ 2348.250589] numa_policy 3KB 3KB [ 2348.251206] trace_event_file 163KB 163KB [ 2348.251803] ftrace_event_field 280KB 280KB [ 2348.252434] pool_workqueue 48KB 48KB [ 2348.253064] task_group 16KB 16KB [ 2348.253664] vmap_area 102KB 118KB [ 2348.254309] page->ptl 233KB 547KB [ 2348.254923] kmemleak_scan_area 48KB 67KB [ 2348.256923] kmemleak_object 130923KB 154426KB [ 2348.257533] kmalloc-8k 4416KB 4672KB [ 2348.258159] kmalloc-4k 6440KB 6752KB [ 2348.258766] kmalloc-2k 4076KB 5088KB [ 2348.259392] kmalloc-1k 2288KB 3360KB [ 2348.260023] kmalloc-512 2266KB 3312KB [ 2348.260624] kmalloc-256 1168KB 1168KB [ 2348.261258] kmalloc-192 608KB 608KB [ 2348.261884] kmalloc-128 591KB 632KB [ 2348.262499] kmalloc-96 276KB 492KB [ 2348.263143] kmalloc-64 971KB 1312KB [ 2348.263759] kmalloc-32 730KB 860KB [ 2348.264359] kmalloc-16 376KB 376KB [ 2348.264983] kmalloc-8 330KB 330KB [ 2348.265582] kmem_cache_node 47KB 47KB [ 2348.266206] kmem_cache 75KB 75KB [ 2348.266801] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journald.service,task=systemd-journal,pid=103,uid=0 [ 2348.269144] Out of memory (oom_kill_allocating_task): Killed process 103 (systemd-journal) total-vm:31940kB, anon-rss:884kB, file-rss:320kB, shmem-rss:4kB, UID:0 pgtables:88kB oom_score_adj:-250 [ 2348.282930] in:imklog invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2348.284958] CPU: 0 PID: 177 Comm: in:imklog Not tainted 5.10.156 #1 [ 2348.286184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2348.287733] Call Trace: [ 2348.288232] dump_stack+0x107/0x167 [ 2348.288925] dump_header+0x106/0x613 [ 2348.289632] oom_kill_process.cold+0x10/0x15 [ 2348.290462] out_of_memory+0x110f/0x1410 [ 2348.291236] ? oom_killer_disable+0x280/0x280 [ 2348.292074] ? mutex_trylock+0x237/0x2b0 [ 2348.292842] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2220 [ 2348.293949] __alloc_pages_slowpath.constprop.0+0x1bf3/0x2220 [ 2348.295048] ? lock_acquire+0x117/0x490 [ 2348.295810] ? warn_alloc+0x190/0x190 [ 2348.296531] __alloc_pages_nodemask+0x553/0x680 [ 2348.297411] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2348.298531] ? xas_load+0x66/0x2c0 [ 2348.299198] ? find_get_entry+0x2d9/0x6e0 [ 2348.299982] alloc_pages_current+0x187/0x280 [ 2348.300802] __page_cache_alloc+0x2d2/0x360 [ 2348.301611] pagecache_get_page+0x2c7/0xc80 [ 2348.302417] filemap_fault+0x177d/0x21b0 [ 2348.303169] ? read_cache_page_gfp+0x30/0x30 [ 2348.303979] ? replace_page_cache_page+0x1200/0x1200 [ 2348.304929] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 2348.305901] ext4_filemap_fault+0x87/0xc0 [ 2348.306665] __do_fault+0x113/0x410 [ 2348.307354] handle_mm_fault+0x1e72/0x3520 [ 2348.308141] ? fsnotify+0xf30/0xf30 [ 2348.308818] ? __pmd_alloc+0x5e0/0x5e0 [ 2348.309529] ? vmacache_find+0x55/0x2a0 [ 2348.310244] ? vmacache_update+0xce/0x140 [ 2348.311004] do_user_addr_fault+0x56e/0xc00 [ 2348.311796] exc_page_fault+0xa2/0x1a0 [ 2348.312499] ? asm_exc_page_fault+0x8/0x30 [ 2348.313280] asm_exc_page_fault+0x1e/0x30 [ 2348.314030] RIP: 0033:0x7fa4daede9ae [ 2348.314701] Code: Unable to access opcode bytes at RIP 0x7fa4daede984. [ 2348.315896] RSP: 002b:00007fa4da9f4500 EFLAGS: 00010202 [ 2348.316868] RAX: 0000000000000b24 RBX: 0000000000000000 RCX: 00007fa4db45808c [ 2348.318235] RDX: 0000000000001fa0 RSI: 00007fa4da9f4d00 RDI: 0000000000000000 [ 2348.319589] RBP: 0000558e1f0084c0 R08: 0000000000000000 R09: 0000000000000000 [ 2348.321005] R10: a3d70a3d70a3d70b R11: 0000000000000000 R12: 00007fa4da9f4d00 [ 2348.322337] R13: 0000000000001fa0 R14: 00007fa4da9f4d00 R15: 00007fa4da9f53b6 [ 2348.323898] Mem-Info: [ 2348.324378] active_anon:33 inactive_anon:8113 isolated_anon:0 [ 2348.324378] active_file:170 inactive_file:258 isolated_file:30 [ 2348.324378] unevictable:0 dirty:121 writeback:5 [ 2348.324378] slab_reclaimable:7326 slab_unreclaimable:59993 [ 2348.324378] mapped:8966 shmem:69 pagetables:349 bounce:0 [ 2348.324378] free:4533 free_pcp:263 free_cma:0 [ 2348.330070] Node 0 active_anon:132kB inactive_anon:31864kB active_file:680kB inactive_file:1032kB unevictable:0kB isolated(anon):0kB isolated(file):120kB mapped:35864kB dirty:484kB writeback:20kB shmem:276kB writeback_tmp:0kB kernel_stack:2912kB all_unreclaimable? no [ 2348.334281] Node 0 DMA free:6492kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:4kB inactive_file:24kB unevictable:0kB writepending:4kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2348.339110] lowmem_reserve[]: 0 1618 1618 1618 [ 2348.340016] Node 0 DMA32 free:8504kB min:17768kB low:19424kB high:21080kB reserved_highatomic:0KB active_anon:132kB inactive_anon:32200kB active_file:952kB inactive_file:1284kB unevictable:0kB writepending:500kB present:2080640kB managed:1662796kB mlocked:0kB pagetables:1396kB bounce:0kB free_pcp:712kB local_pcp:52kB free_cma:0kB [ 2348.345233] lowmem_reserve[]: 0 0 0 0 [ 2348.345969] Node 0 DMA: 3*4kB (UM) 2*8kB (M) 3*16kB (UM) 1*32kB (U) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6508kB [ 2348.348781] Node 0 DMA32: 500*4kB (UME) 289*8kB (UME) 116*16kB (UME) 53*32kB (UME) 10*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8504kB [ 2348.351422] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2348.353129] 323 total pagecache pages [ 2348.353976] 0 pages in swap cache [ 2348.354577] Swap cache stats: add 0, delete 0, find 0/0 [ 2348.355523] Free swap = 0kB [ 2348.356079] Total swap = 0kB [ 2348.356604] 524158 pages RAM [ 2348.357172] 0 pages HighMem/MovableOnly [ 2348.357900] 104482 pages reserved [ 2348.358513] Unreclaimable slab info: [ 2348.359197] Name Used Total [ 2348.360214] pid_2 103KB 303KB [ 2348.361197] p9_req_t 8KB 8KB [ 2348.362168] fib6_nodes 28KB 28KB [ 2348.363137] ip6_dst_cache 45KB 45KB [ 2348.364101] PINGv6 31KB 31KB [ 2348.365082] RAWv6 157KB 157KB [ 2348.366054] UDPLITEv6 62KB 62KB [ 2348.367021] UDPv6 62KB 62KB [ 2348.367986] tw_sock_TCPv6 7KB 7KB [ 2348.368950] TCPv6 62KB 62KB [ 2348.369915] scsi_sense_cache 8KB 8KB [ 2348.370872] sd_ext_cdb 3KB 3KB [ 2348.371806] virtio_scsi_cmd 16KB 16KB [ 2348.372779] sgpool-128 59KB 59KB [ 2348.373735] sgpool-64 63KB 63KB [ 2348.374696] sgpool-32 630KB 630KB [ 2348.375650] sgpool-16 180KB 180KB [ 2348.376782] sgpool-8 142KB 142KB [ 2348.377916] mqueue_inode_cache 62KB 62KB [ 2348.379052] nfs_commit_data 15KB 15KB [ 2348.380161] nfs_write_data 47KB 47KB [ 2348.381292] jbd2_inode 7KB 7KB [ 2348.382469] ext4_system_zone 7KB 7KB [ 2348.383569] ext4_io_end_vec 7KB 7KB [ 2348.384692] ext4_bio_post_read_ctx 15KB 15KB [ 2348.385905] io_kiocb 11KB 11KB [ 2348.387034] kioctx 31KB 31KB [ 2348.388166] aio_kiocb 7KB 7KB [ 2348.389286] dio 15KB 15KB [ 2348.390372] bio-2 4KB 4KB [ 2348.391470] pid_namespace 7KB 7KB [ 2348.392562] posix_timers_cache 7KB 7KB [ 2348.393699] rpc_buffers 31KB 31KB [ 2348.394784] rpc_tasks 3KB 3KB [ 2348.395893] UNIX 261KB 310KB [ 2348.397003] tcp_bind_bucket 8KB 8KB [ 2348.398106] xfrm_state 32KB 32KB [ 2348.399214] ip_fib_trie 8KB 8KB [ 2348.400312] ip_fib_alias 15KB 15KB [ 2348.401420] ip_dst_cache 28KB 28KB [ 2348.402586] PING 62KB 62KB [ 2348.403727] RAW 93KB 93KB [ 2348.404899] UDP 168KB 283KB [ 2348.406031] tw_sock_TCP 7KB 7KB [ 2348.407158] request_sock_TCP 7KB 7KB [ 2348.408288] TCP 60KB 60KB [ 2348.409425] hugetlbfs_inode_cache 30KB 30KB [ 2348.410615] bio-1 11KB 11KB [ 2348.411718] eventpoll_pwq 23KB 23KB [ 2348.412864] eventpoll_epi 59KB 59KB [ 2348.413992] inotify_inode_mark 70KB 70KB [ 2348.415129] request_queue 60KB 60KB [ 2348.416115] blkdev_ioc 37KB 37KB [ 2348.417106] bio-0 628KB 628KB [ 2348.418090] biovec-max 1134KB 1134KB [ 2348.419070] biovec-64 834KB 834KB [ 2348.420044] biovec-16 142KB 142KB [ 2348.421033] uid_cache 8KB 8KB [ 2348.422008] dmaengine-unmap-2 4KB 4KB [ 2348.423097] audit_buffer 7KB 7KB [ 2348.424228] skbuff_ext_cache 140KB 184KB [ 2348.425356] skbuff_fclone_cache 67KB 75KB [ 2348.426501] skbuff_head_cache 266KB 266KB [ 2348.427593] file_lock_cache 31KB 47KB [ 2348.428760] file_lock_ctx 7KB 7KB [ 2348.429904] fsnotify_mark_connector 40KB 40KB [ 2348.431079] net_namespace 88KB 88KB [ 2348.432189] task_delay_info 162KB 285KB [ 2348.433298] taskstats 61KB 61KB [ 2348.434384] proc_dir_entry 319KB 337KB [ 2348.435460] pde_opener 39KB 39KB [ 2348.436504] seq_file 67KB 67KB [ 2348.437554] sigqueue 106KB 106KB [ 2348.438644] shmem_inode_cache 1227KB 1383KB [ 2348.439705] kernfs_iattrs_cache 239KB 239KB [ 2348.440851] kernfs_node_cache 5033KB 5091KB [ 2348.441967] mnt_cache 141KB 141KB [ 2348.443105] filp 1238KB 1522KB [ 2348.444048] names_cache 7123KB 7348KB [ 2348.445015] hashtab_node 274KB 274KB [ 2348.445961] ebitmap_node 1149KB 1149KB [ 2348.446875] avtab_node 4976KB 4976KB [ 2348.447777] avc_node 31KB 31KB [ 2348.448715] lsm_inode_cache 2599KB 3087KB [ 2348.449651] lsm_file_cache 159KB 212KB [ 2348.450570] key_jar 23KB 23KB [ 2348.451494] uts_namespace 15KB 15KB [ 2348.452420] nsproxy 15KB 15KB [ 2348.453454] vm_area_struct 1497KB 2292KB [ 2348.454375] mm_struct 353KB 504KB [ 2348.455297] fs_cache 42KB 84KB [ 2348.456206] files_cache 302KB 302KB [ 2348.457139] signal_cache 414KB 648KB [ 2348.458072] sighand_cache 314KB 541KB [ 2348.459020] task_struct 1383KB 3315KB [ 2348.459947] cred_jar 122KB 228KB [ 2348.460909] anon_vma_chain 345KB 653KB [ 2348.461850] anon_vma 173KB 286KB [ 2348.462741] pid 66KB 67KB [ 2348.463653] Acpi-Operand 128KB 162KB [ 2348.464558] Acpi-ParseExt 31KB 31KB [ 2348.465495] Acpi-Parse 134KB 150KB [ 2348.466400] Acpi-State 137KB 153KB [ 2348.467312] Acpi-Namespace 24KB 24KB [ 2348.468232] numa_policy 3KB 3KB [ 2348.469146] trace_event_file 163KB 163KB [ 2348.470057] ftrace_event_field 280KB 280KB [ 2348.470981] pool_workqueue 48KB 48KB [ 2348.471873] task_group 16KB 16KB [ 2348.472754] vmap_area 102KB 118KB [ 2348.473689] page->ptl 233KB 547KB [ 2348.474595] kmemleak_scan_area 48KB 67KB [ 2348.476907] kmemleak_object 131025KB 154426KB [ 2348.477819] kmalloc-8k 4416KB 4672KB [ 2348.478857] kmalloc-4k 6440KB 6752KB [ 2348.479865] kmalloc-2k 4076KB 5088KB [ 2348.480748] kmalloc-1k 2288KB 3360KB [ 2348.481681] kmalloc-512 2266KB 3312KB [ 2348.482597] kmalloc-256 1168KB 1168KB [ 2348.483510] kmalloc-192 616KB 616KB [ 2348.484436] kmalloc-128 591KB 632KB [ 2348.485383] kmalloc-96 276KB 492KB [ 2348.486318] kmalloc-64 971KB 1312KB [ 2348.487229] kmalloc-32 730KB 860KB [ 2348.488129] kmalloc-16 376KB 376KB [ 2348.489038] kmalloc-8 330KB 330KB [ 2348.489942] kmem_cache_node 47KB 47KB [ 2348.490840] kmem_cache 75KB 75KB [ 2348.491723] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/rsyslog.service,task=in:imklog,pid=177,uid=0 [ 2348.494390] Out of memory (oom_kill_allocating_task): Killed process 174 (rsyslogd) total-vm:220876kB, anon-rss:1076kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:0 [ 2348.800028] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 2348.806130] systemd[1]: systemd-journald.service: Failed with result 'oom-kill'. [ 2348.826318] systemd[1]: systemd-journald.service: Consumed 5.095s CPU time. [ 2348.834011] systemd[1]: rsyslog.service: Main process exited, code=killed, status=9/KILL [ 2348.837856] systemd[1]: rsyslog.service: Failed with result 'oom-kill'. [ 2348.852456] systemd[1]: rsyslog.service: Consumed 1.216s CPU time. [ 2348.856165] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 2348.863055] oom_reaper: reaped process 130914 (syz-executor.7), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2348.897427] systemd[1]: Stopping Flush Journal to Persistent Storage... [ 2348.975593] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 1. [ 2348.977380] systemd[1]: Stopped System Logging Service. [ 2348.978952] systemd[1]: rsyslog.service: Consumed 1.216s CPU time. [ 2349.046499] systemd[1]: Starting System Logging Service... [ 2349.050640] systemd[1]: Stopped target Bluetooth. [ 2349.191502] systemd[1]: systemd-journal-flush.service: Succeeded. [ 2349.206170] systemd[1]: Stopped Flush Journal to Persistent Storage. [ 2349.209099] systemd[1]: Stopped Journal Service. [ 2349.210589] systemd[1]: systemd-journald.service: Consumed 5.095s CPU time. [ 2349.257160] systemd[1]: Starting Journal Service... [ 2349.260002] systemd[1]: Started System Logging Service. [ 2349.430979] systemd-journald[131725]: File /var/log/journal/7e681e5076844de4a5cfa8606a84b008/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 2349.958224] systemd[1]: Started Journal Service. [ 2350.058711] systemd-journald[131725]: Received client request to flush runtime journal. VM DIAGNOSIS: 12:48:49 Registers: info registers vcpu 0 RAX=0000000000000005 RBX=ffff88804aba5558 RCX=0000000000000001 RDX=0000000000000000 RSI=ffffffff84ff80e0 RDI=ffff88804aba5558 RBP=ffffffff84ff80e0 RSP=ffff88804b49f7e0 R8 =0000000000000001 R9 =ffffffff85670ccf R10=fffffbfff0ace199 R11=0000000000000001 R12=ffff88804aba4c80 R13=ffff88804aba5530 R14=00000000ffffffff R15=ffff88804aba5558 RIP=ffffffff83e0710c RFL=00000006 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007efc37025700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f0b1ba5fff0 CR3=000000004a1aa000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=56b4eb9a7fc956f67c5a9b21af1547b7 XMM02=a44b819fcb38318d52517ad759d28135 XMM03=4817f03aa8e3c95539698a2486041a13 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=0e0d0c0f0a09080b0605040702010003 XMM08=64707466730073254073250070746673 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffed1001148024 RBX=ffffed1001148025 RCX=ffffffff816c9f3c RDX=ffffed1001148025 RSI=0000000000000008 RDI=ffff888008a40120 RBP=ffffed1001148024 RSP=ffff88804b1177a0 R8 =0000000000000001 R9 =ffff888008a40127 R10=ffffed1001148024 R11=0000000000000001 R12=0000000000000001 R13=ffff88804b117870 R14=dffffc0000000000 R15=ffff88804b117868 RIP=ffffffff816bd048 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fec075c08c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc02da54e08 CR3=000000004a0e6000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=32326c6c696b66723a6c6c696b66722b XMM03=0032326c6c696b66723a6c6c696b6672 XMM04=000055d1d5cdde70000055d1d5cd70c0 XMM05=0000000800000003000055d1d5ce9520 XMM06=000055d1d5ccaa50ffffffff00000000 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000